ProtonBlog

Bug Fixes

  • Fixed a bug that prevents some email address from showing in ‘CC’ when hitting ‘Reply to All’
  • Fixed a bug that user’s email address is not shown appropriately in pages not in the email system when they log in
  • Clarified wording for expiration time
  • Fixed a bug on the default expiration time for encrypted outside email
  • Various styling updates for tablet and mobile

New Features

  • Increase the default RSA key length from 1024 to 2048


Known Issues

  • Multiple attachments not properly supported, however you can upload multiple attachments which are stored in the safe folder on your local disk
  • Internet Explorer not yet fully supported, however IE11 is OK
  • Safari is not yet fully supported
  • Mobile and Tablet not yet fully supported
  • Emails cannot be sent to Yahoo, Proton Mail is not yet on the whitelist
  • Spam filtering of incoming unencrypted emails not yet working
Proteja seus e-mails e sua privacidade
Obtenha o Proton Mail grátis

Artigos relacionados

compromised passwords
en
  • Princípios básicos de privacidade
Compromised passwords are a common issue and probably one of the biggest cybersecurity threats for regular people. How do passwords get compromised, and is there anything you can do to prevent it? * What does compromised password mean? * How do pa
Is WeTransfer safe?
en
  • Princípios básicos de privacidade
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
en
  • Princípios básicos de privacidade
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
en
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
en
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
en
  • Princípios básicos de privacidade
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a