Proton

Dear Early Adopters,

A lot of progress has been made since our last waiting list update(new window).  Our major infrastructure upgrades(new window) went smoothly and have made Proton Mail even more reliable, secure, and ready to take in more users than ever before.  We are pleased to announce that we have sent out close to 300,000 invites in the last several months!

For users who signed up on the waiting list before January 15th 2015, the wait is now over. If you signed up before January 15th, you should have received an invitation email. Unfortunately, it is possible this invite email was lost in your spam folder or dropped by your current email service provider (AOL.com for instance has had some issues lately). If you registered for Proton Mail before January 15th and are still waiting, please kindly email us at contact@proton.me with your username or outside email so we can try resending your invite.

For our new friends who only found out about Proton Mail recently, your wait will not be as long! We are inviting new users every week and will very soon, almost surely, approach instant access. The next several months will be very exciting as we will be deploying some long-awaited features and announce some more good news. Thanks again for your patience and support as we improve Proton Mail!

Related articles

The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.
A graphic interpretation of a block of how many gigabytes in a terabyte
Learn how many GB are in a TB and discover the best way to securely store and share your files — no matter their size.
The cover image for a Proton blog, showing a phone screen with a lock logo and three password fields surrounding the phone
Here's what to look for when choosing an enterprise password manager to streamline collaboration and protect your organization's sensitive data.