Proton

We’re excited to announce that we’ve open-sourced the Proton Drive Android and iOS apps’ code. This means the code for all Proton apps out of beta, including all Proton Drive apps, is now available for anyone to examine. You can verify for yourself that these are doing exactly what we claim. 

You can find the code for the Proton Drive mobile apps on the Proton Drive apps GitHub(new window).

The code for every Proton Mail and Proton Calendar app, as well as the Proton Drive web app is on the Proton Mail GitHub(new window)

You can find the code for all Proton VPN apps on its GitHub page(new window)

Security through transparency

As an organization founded by scientists who met at CERN, we believe this level of transparency is not only essential to earning the trust of the Proton community, but it’s also how progress is made. By publishing our apps’ code, we make it available to the online network of security experts and white hat hackers. 

Their close scrutiny of our apps, which we incentivize through our Bug Bounty Program, ensures that any potential vulnerabilities are swiftly discovered and resolved. This approach of ‘security through transparency’ translates to better security and privacy for your personal information. 

Proton Drive apps have passed independent security audits

As part of making the Proton Drive mobile apps open source, we also subjected them to an independent security audit by Securitum(new window). Securitum is a respected European IT security company that has conducted security audits and tests for many of Europe’s largest companies. 

These reports allow you to get an expert assessment of our apps’ security if you don’t have the time or inclination to examine the code for yourself.

According to their report, Securitum found no outstanding vulnerabilities in our Android or iOS apps.

Read the security audit for the Proton Drive iOS app(new window)

Read the security audit for the Proton Drive Android app(new window)

You can also find the latest security audit reports for all Proton services on our community page explaining why we prioritize open-source code.

A better internet begins with open source 

We’ve been supporters of the open-source community ever since we made the Proton Mail web app open source in 2015. 

We maintain two of the most popular open-source cryptographic libraries, OpenPGP.js(new window) and GopenPGP,(new window) that make it easier for more developers to add secure encryption to their own apps and secure more data. 

We’ve also contributed to multiple open-source projects over the years through our Lifetime Account Charity Fundraiser, including WireGuard(new window)®, Qubes OS(new window), GrapheneOS(new window), and Tails(new window).

We believe this system of open development and peer review leads to better, more secure programs that keep all of our information secure. Thank you to the Proton community for enabling our work, and we invite you to contribute to our code yourself on GitHub. 

Related articles

A phone screen with a speech bubble with a phone number in it
en
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
en
  • Privacy news
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.
Coinbase, the largest Bitcoin exchange in the US, suffered a data breach
en
  • Privacy news
  • Proton Wallet
Coinbase employees sold sensitive personal information to attackers, including government IDs and BTC transaction history. Proton Wallet is built to avoid these risks.
Whistleblower's whistle. Journalists must use secure channels to communicate with whistleblowers.
en
Whistleblowers risk everything to expose the truth. This guide helps journalists keep their sources safe using secure tools like Proton Mail, Signal, and SecureDrop.
An image showing a phone screen with a child icon and three icons with '17+' '8-12' and '3-5' to indicate age ratings
en
Parents can help their children develop healthy screen habits by learning about dark design patterns — Proton investigates how