Proton
An illustration of Proton Mail's code being examined.

The new Proton Mail has passed its independent security audit

At Proton(new window), we believe everyone should be in control of their personal data. A critical component of controlling your data is having the ability to make informed decisions about who you entrust with your data and how it is secured. Most companies rely on security through obscurity and do not share their code, making it impossible for you to accurately assess how secure their service is.

Rather than relying on secrecy to protect our code, we believe in security through transparency, which means we: 

  • Make all our apps open source to leverage the expertise of IT security experts and the Proton community
  • Commission independent security experts to conduct regular audits of our code
  • Share the audit reports with the public

By subjecting our apps to rigorous public examination, we ensure that any potential vulnerabilities are swiftly discovered and resolved. 

We have previously shared the results of the audits for our Proton Mail(new window) and Proton VPN(new window) apps. Now that we have released the new Proton Mail, including Proton Calendar(new window), we would like to share the results of its audit as well.

The new Proton Mail is secure

Like all Proton applications, the new Proton Mail is open source, and anyone can inspect its code for themselves on GitHub(new window)

Prior to their release, the source code of both the new Proton Mail and Proton Calendar underwent an extensive security audit. We are happy to announce the final report was overwhelmingly positive, and the audit uncovered no major issues or security vulnerabilities

Read the audit report for the new Proton Mail(new window)

This security audit was carried out by Securitum(new window), a leading European security auditing company. Securitum currently oversees more than 300 security testing projects every year, including for many top European banks.

Read the latest audit reports for all Proton services

Security through transparency

Proton Mail was founded by scientists who met at the European Organization for Nuclear Research (CERN), and the scientific principles of peer review and transparency are core values of our team. Just as we would not trust a result without first seeing the underlying data, we do not expect you to trust us without being able to examine our work for yourselves. 

If you have questions or comments about the security audit for the new Proton Mail, please share them with us! Join the conversation on Twitter(new window) and Reddit(new window).

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

How to delete all photos from Google Photos
Using Google Photos to store and share your pictures means allowing the company to see, analyze, and process them. Many people concerned about their privacy have taken steps to move away from the Google ecosystem, despite the company’s efforts to hid
Proton Wallet
  • Product updates
  • Proton news
  • Proton Wallet
WHAT IS PROTON WALLET? Our long-term vision is for Proton Wallet to be a digital wallet that gives you full control of your digital assets. While the type of assets that you can hold in Proton Wallet may evolve over time as we add more capabilities
  • Privacy guides
Bitcoin is an innovative payment network that leverages peer-to-peer transactions to remove the need for a central bank. Bitcoin has revolutionized the core principles of value exchange by showing that a network of fully independent nodes can operate
Proton Wallet is a digital asset wallet that currently supports self-custody on-chain Bitcoin. In this article, we review the key features and security architecture that make Proton Wallet a private and secure wallet that is as easy to use as email.
proton scribe
Most of us send emails every day. Finding the right words and tone, however, can take up a lot of time. Today we’re introducing Proton Scribe, a smart, privacy-first writing assistant built right into Proton Mail that helps you compose and improve yo
People and companies are generally subject to the laws of the country and city where they are located, and those laws can change when they move to a new place. However, the situation becomes more complicated when considering data, which can be subjec