Proton

At Proton, we want you to be able to choose what happens to your personal information, which is why we’ve built a suite of encrypted services that put you in control. An integral part of giving you control is explaining exactly how our services work, including how they protect your information. This is the only way you can make an informed decision about who to entrust with the details of your life. 

Given the sensitive information you protect with your password manager, it’s crucial that you know exactly what’s happening inside it. Because Proton Pass is open source, anyone can inspect our code and ensure that the apps work as described.

You can find the source code for Proton Pass here:

Review the code for all Proton apps

Proton Pass has passed an independent security audit

While being open source means that anybody can audit our code, not everyone has the time, technical expertise, or interest to pore over our apps’ code. That’s why we also regularly commission and publish independent security audits for all our apps.

Proton Pass’s code underwent a security audit by the German security firm Cure53(nova janela) throughout May and June. We selected Cure53 to handle the Proton Pass audit because we wanted to ensure that Proton Pass received the most rigorous testing possible, and Cure53 has extensive experience investigating browser extensions and password managers. They tested all Proton Pass mobile apps, browser extensions, and our API.

Cure53 had this to say about Proton Pass, “Proton’s extensive and thorough security assessment by Cure53 showcased their commitment to maintaining a high-level of security. With a moderate number of findings and most security vulnerabilities limited in severity, the overall state of security across Proton’s applications and platforms is commendable”. 

These results reflect Proton’s deep security DNA and help validate many of the architectural decisions we made with Proton Pass. There are also password management-specific considerations that this audit helped raise to our attention. For instance, we missed a case where an attacker might control a subdomain on a domain where the user has an account and thus trick a user who isn’t paying attention into accidentally entering their credentials. 

All issues reported in the security audit have been resolved except for the medium severity issue PRO-01-003 WP1, which unfortunately cannot be resolved at this time due to a platform limitation in Android (the Android operating system doesn’t currently provide the information that would be required to solve this issue). You can read the Proton Pass audit report(nova janela) for yourself. You can also find the audit reports for all Proton services.  

Security you can trust and verify

As a company run by scientists (Proton was founded by scientists who met at CERN), we believe strongly in the scientific ethos of transparency and peer review. Proton’s security and privacy claims can be independently verified by others, and our open-source code allows our claims to be continually tested, verified, and even improved.

Instead of hiding vulnerabilities and relying on secrecy to maintain “security” like other companies, we subject all our services to rigorous public examination, allowing us to swiftly find and resolve any issues. 

For this reason, we also actively encourage the inspection and checking of Proton’s code through our public Bug Bounty Program.  If you have questions or comments about Proton Pass, its security audit, or our approach to open source, please share them with us! Join the conversation on Twitter(nova janela) and Reddit(nova janela).

Proteja suas senhas
Crie uma conta gratuita

Artigos relacionados

Is deepseek safe
en
  • Notícias sobre privacidade
Not only does DeepSeek collect extensive personal information, but it cannot legally resist government demands for access to that data.
The cover image for a Proton Pass blog explaining how a family password manager can save parents time - the image shows three password fields on top of each other with a security shield shape containing two adult figures and one child figure
en
  • Guias de privacidade
Tired of resetting passwords for your family? Find out how a family password manager can help you save time on password admin.
what does bcc mean in email
en
  • Guias de privacidade
What is BCC in email language? Here's what BCC means, how it works, and when and why you might want to use it.
President Trump is now at the head of the US warrantless surveillance machine
en
President Trump now controls of the US government's warrantless surveillance machine. We look at how it works and how to defend yourself.
en
See our predictions for the internet in 2025, from AI cyberattacks to DIY surveillance.
he cover image for a blog explaining how to see and manage your saved passwords easily in Proton Pass
en
  • Guias de privacidade
Saving passwords in a password manager can help you stay safe online, but how can you see all your saved passwords in one place? Find out with Proton Pass.