Update: As of December 2016, Proton Mail has switched to a single password system as the default. The two-password mode described in this article is still available and supported, but is no longer the default.
Proton Mail uses two passwords to secure your account: login and mailbox.
Login password
(new window)Your login password is the first password you enter and it authenticates you and logs you into our secure system.
MailBox password
(new window)Your mailbox password is the second password you enter and this unlocks and decrypts your encrypted messages locally.
Cyberattacks aren’t always executed through sophisticated methods like
man-in-the-middle (MITM) attacks on public WiFi. Sometimes, they rely on
something as simple as looking over your shoulder.
Shoulder surfing attacks are when someone watches you
Proton prioritizes our community’s privacy and data security in every aspect of
our business.
To further demonstrate our commitment, we underwent a rigorous external audit
and – on May 2, 2024 – received our ISO 27001 certification.
As an organiz
Anyone with an iPhone can now enjoy Proton Drive’s secure and private photo
backup capabilities. This feature is gradually rolling out to the Proton
community and will be available to everyone by the end of this week.
Smartphones have made us all am
From the very beginning, Proton has always been a different type of
organization. This was probably evident from the way in which we got started via
a public crowdfunding campaign that saw 10,000 people donate over $500,000 to
launch development. As
Your online data is valuable. While it might feel like you’re browsing the web
for free, you’re actually paying marketing companies with your personal
information. Often, even when you pay for services, these companies still
collect and profit from y
Password spraying attacks pose a major risk to individuals and organizations as
a method to breach network security by trying commonly used passwords across
numerous accounts.
This article explores password spraying attacks, explaining their methods