ProtonBlog

Proton Mail BETA v1.03 Release Notes

We are happy to announce the release of Proton Mail v1.03. This update contains a number of important security and functionality improvements. As usual, please completely clear your browser cache to make sure you load the latest version of Proton Mail.

Bug Fixes

  • Can now star messages from the message display page
  • Made some improvements to message quoting behavior

New Features

  • Enabled HSTS [Security]
  • Disabled support for weak SSL ciphers [Security]
  • Disabled support for SSLv2 [Security]
  • Opportunistic TLS for incoming and outgoing emails [Security]
  • Proton Mail now supports most languages
  • Proton Mail now supports the latest versions of Firefox (v29), Chrome (v34+), IE (v11), and Safari (v7.03+)


Known Issues

  • Multiple attachments not properly supported
  • Notification emails are still disabled for now (IP reputation reasons)
  • Older browser versions are not fully supported, please use the latest browser versions.
  • Mobile and Tablet not yet fully supported
  • Emails cannot be sent to Yahoo, this is a problem on the Yahoo end, we are working with them to resolve this.
  • Spam filtering of incoming unencrypted emails not activated yet.
Безопасная электронная почта и защита вашей конфиденциальности
Скачать Proton Mail бесплатно

Статьи по теме

compromised passwords
en
  • Основы конфиденциальности
Compromised passwords are a common issue and probably one of the biggest cybersecurity threats for regular people. How do passwords get compromised, and is there anything you can do to prevent it? * What does compromised password mean? * How do pa
Is WeTransfer safe?
en
  • Основы конфиденциальности
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
en
  • Основы конфиденциальности
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
en
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
en
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
en
  • Основы конфиденциальности
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a