Proton

Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty Switzerland(новое окно) and our new private bug bounty program made up of expert ethical hackers and security researchers.

Bug Bounty Switzerland has successfully led some of Switzerland’s largest bug bounty programs and public scrutiny initiatives. Thousands of security researchers have participated in their programs to secure Swiss companies, public sector organizations, and critical infrastructure. They will manage our private bug bounty program and help us build an even stronger security community around our products. 

We invite all sophisticated hackers and researchers with experience searching for, identifying, and addressing advanced hacks and techniques used by nation-states, criminal organizations, or other bad actors to apply for this program. We are specifically looking for demonstrated expertise in the following areas:

  • Finding vulnerabilities in mail and communication systems
  • Compromising encryption techniques
  • Compromising backend APIs
  • Hacking mobile applications, Windows, Linux, or Apple systems
  • Researching VPN technology

Proton will reward people for reporting vulnerabilities in our products. Key focus areas include:

  • Vulnerabilities that will compromise a Proton user’s personal data
  • Compromising Proton’s encryption (password leaks, private keys, etc.)
  • The ability to demonstrate unauthorized access to customer data (such as email, calendar, etc.)
  • Demonstrating EOP, sensitive information disclosure, or availability vulnerabilities in Proton products
  • Compromising Proton API or server infrastructure
  • Demonstrating the ability to compromise applications running on mobile devices, Windows, Linux, and Apple

Proton strives to maintain the highest software security standards for our products, and we pride ourselves on our ability to adapt and use the best security practices within our software development life cycle. We are committed to working closely with qualified security researchers to ensure that our products are as secure as possible. If you are interested in participating in this bounty program, you can apply at https://www.bugbounty.ch/proton(новое окно).

Статьи по теме

Learn what you're exposing yourself to when you use temporary email services like 10-Minute Mail
en
  • Советы о конфиденциальности
Learn what you're exposing yourself to when you use temporary email services like 10-Minute Mail — and why an alias is a better way to protect your privacy.
Is deepseek safe
en
  • Новости о конфиденциальности
Not only does DeepSeek collect extensive personal information, but it cannot legally resist government demands for access to that data.
The cover image for a Proton Pass blog explaining how a family password manager can save parents time - the image shows three password fields on top of each other with a security shield shape containing two adult figures and one child figure
en
  • Советы о конфиденциальности
Tired of resetting passwords for your family? Find out how a family password manager can help you save time on password admin.
what does bcc mean in email
en
  • Советы о конфиденциальности
What is BCC in email language? Here's what BCC means, how it works, and when and why you might want to use it.
President Trump is now at the head of the US warrantless surveillance machine
en
  • Новости о конфиденциальности
President Trump now controls of the US government's warrantless surveillance machine. We look at how it works and how to defend yourself.
en
  • Мнения
See our predictions for the internet in 2025, from AI cyberattacks to DIY surveillance.