ProtonBlog(new window)

Security experts declare all Proton apps secure after they pass their security audit

Share this page

At Proton, transparency is one of our core principles. Simply put, people cannot make informed decisions without knowing how their data is secured, which is why we have made all our apps open source. This “security through transparency” approach means our apps consistently face rigorous scrutiny, and it also means that any potential vulnerabilities are swiftly found and resolved.

However, raw code is not understandable for everyone, so we also commission independent security experts to audit our code and share their results. Even if you do not understand how to run a security audit yourself, you can see what experts in the field discovered.

Security experts inspect Proton apps

In September 2021, Securitum inspected all Proton apps as part of their security audit. We are happy to announce that their tests uncovered no major issues or security vulnerabilities.

You can read their letters of attestation by service below:

Securitum(new window) is a leading European IT security company, handling security audits and tests for many of Europe’s largest companies. They also handled the security audit of the new Proton Mail and Proton Calendar(new window) in early 2021.

Read our most recent security audit reports

Transparency is the key to trust

As an organization founded by former scientists and physicists who met at the European Organization for Nuclear Research (CERN), we believe peer review is essential to ensure your result is sound. We apply the same approach to Proton. We want you to be able to examine our work for yourselves and read experts’ audits before you entrust us with your data.  

You can find the code for all of Proton’s apps on the Proton Mail GitHub(new window) and Proton VPN GitHub(new window).

If you have questions or comments about the latest security audits, share them with us! Join the conversation on Twitter(new window) and Reddit(new window).

Update 29 March 2022: This article was republished using the term “security audit” instead of “penetration test” to stay consistent with past practice.

Protect your privacy with Proton
Create a free account

Share this page

Richie Koch(new window)

Prior to joining Proton, Richie spent several years working on tech solutions in the developing world. He joined the Proton team to advance the rights of online privacy and freedom.

Related articles

Even though the Snowden leaks came out 10 years ago, the United States never ended its unconstitutional surveillance program. It now has a chance to close the legal loopholes that allow warrantless spying on US citizens. But Congress needs to act bef
Over the past year, hackers have been using new and clever techniques to steal people’s online data. At Proton, we’ve been monitoring these evolving strategies and updating our defenses to stay ahead of the arms race.  Often, the attacks involve new
password fatigue
Most people in the digital age have dozens, if not hundreds, of passwords, and keeping track of them is tiring, to say the least. If you’re suffering from password fatigue, you’ll be happy to know there’s an easy fix. The short answer is that you sh
are password managers safe?
Password managers are a great way to generate secure passwords, keep them in encrypted storage together with your credit card details, and improve your online security across the board. But you might be worried about keeping so much sensitive data in
Most of us probably wouldn’t consent to sharing photos of our family and friends with random strangers on the internet. But that’s exactly what we do when we automatically sync our pictures to the non-private servers of Big Tech companies, which can
Google Drive is the world’s most popular cloud storage service by far, with over 3 billion people using Google Workspace (which includes Google Drive, Google Calendar, Gmail, and more). But this ubiquity has recently caused concern following several