At Proton, security is our highest priority and something that we work on day and night to improve. We have been very fortunate to have several individuals and organizations step forward to assist us with security auditing. The contributors listed below have dedicated their time and effort to helping us and participating in our Bug Bounty program(new window) because they believe in online privacy and the right to anonymous email.
If you would like to help audit the Proton Mail code, please reach out and let us know! And if we forgot to mention you below, let us know and we will add you right away, we actually don’t know who some of you are because Proton Mail users are anonymous.
Cyberkov(new window) – Cyberkov is a professional IT security services and consultation firm that provides a highly targeted set of security services, including but not limited to: Penetration Testing, Vulnerability Assessments, Security Assessments, Digital Forensics, Incident Response, Source Code Analysis, and Security Awareness Training. [Audit performed, May 2014, April 2016]
Hermes Security Solutions(new window) – Hermes Security Solutions is an offensive cybersecurity company based on hybrid pentesting. Our team, augmented by artificial intelligence, runs controlled attacks against the critical infrastructures of consolidated SMEs, Big Tech corporations, and government entities.
M.R.Vignesh Kumar (new window)(ம.ரா.விக்னேஷ் குமார்) – Security Researcher, தமிழ்நாடு
Thomas Roth – Security Researcher
Matthew R Price
Ivan Krasin(new window) – Google Inc
Maxim Rupp(new window) – cure53.de
Mazin Ahmed(new window) [Audit performed, July 2014]
(Kai) Hrafnkell Gudmundsson
Daniel De Almeida Braga
Brian Carpenter of Geeknik Labs(new window)
Fabián Cuchietti at Innotec Security(new window)
Abdullah Ahmet Erdem
Talal Haj Bakry and Tommy Mysk of Mysk Inc.(new window)
Aziz Al Aman (nxtexploit(new window))
Dr. Peter Hinz
Santhoshkumar Chandramohan(new window) of Ironclad Cyber Security