ProtonBlog

A new Proton experience with Tor

Privacy is a human right, which is why Proton makes all our services available for free. We believe everyone should be able to express themselves and choose what happens to their data, regardless of where they live or their ability to pay.

Unfortunately, authoritarian governments that try to limit the right to privacy and freedom of speech often attempt to block Proton Mail(new window). It has happened in Turkey, Belarus, and Russia.

Often, you can use Proton VPN,(new window) our free, no-logs, open-source VPN service, to bypass these internet blocks, but in the face of advanced and persistent internet censorship, Tor remains one of the most effective solutions.

Proton becomes a Green Onion Member

Tor’s work closely aligns with our vision of building a better internet where privacy is the default. In fact, the Tor Project(new window), the organization that developed the Tor Browser and oversees the Tor network, helped us launch the first version of the Proton Mail onion site (websites on the Tor network are called “onion sites” because .onion is the top-level domain used on the Tor network) back in 2017.

Sadly, more and more governments are turning to internet censorship or shutdowns to control their citizens. This has made Tor, with its anonymous browsing and ability to bypass advanced internet blocks, a vital tool for fighting censorship. That is why we are pleased to announce that Proton now supports the development of Tor as a Green Onion Member(new window). This will allow us to work closely with the Tor Project team and improve your experience on the Proton web apps over Tor.

Access Proton Mail, Proton Calendar, and Proton Drive with the updated Tor site

As part of this collaboration, we have implemented a major update to the Proton Mail site, and have added Proton Calendar and Proton Drive Tor sites. You’ll enjoy a redesigned and easy-to-use inbox, calendar, and file storage while benefiting from Tor’s enhanced privacy protection.

More importantly, you can now sign up for your Proton account directly on our onion site, making it even easier for anyone to use Tor to bypass censorship and set up a Proton account.

With the new update to the Proton Tor site, you can use Proton Mail(new window), Proton Calendar(new window), and Proton Drive(new window) over Tor with the same convenience as our regular web apps.

Learn how to access the Proton Mail Tor site

While this level of anonymity is not necessary for everyone, it can be a lifeline for people if their government is implementing advanced censorship measures or if they are being targeted by hackers. Deciding the level of protection you need when using the internet is a part of determining your threat model.

The fight for a better internet

At Proton, we believe everyone should be able to use the internet and express themselves without worrying about censorship or surveillance. Joining the Tor Project as a Green Onion Member is part of our work towards this goal. 

Our close collaboration with the Tor Project and our updated onion site will provide more ways for people facing advanced online surveillance and censorship to access our services.

Безопасная электронная почта и защита вашей конфиденциальности
Скачать Proton Mail бесплатно

Статьи по теме

What to do if someone steals your Social Security number
en
  • Основы конфиденциальности
If you’re a United States citizen or permanent resident, you have a Social Security number (SSN). This number is the linchpin of much of your existence, linked to everything from your tax records to your credit cards. Theft is a massive problem, whic
compromised passwords
en
  • Основы конфиденциальности
Compromised passwords are a common issue and probably one of the biggest cybersecurity threats for regular people. How do passwords get compromised, and is there anything you can do to prevent it? * What does compromised password mean? * How do pa
Is WeTransfer safe?
en
  • Основы конфиденциальности
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
en
  • Основы конфиденциальности
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
en
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
en
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr