Proton

We’re excited to announce that we’ve open-sourced the Proton Drive Android and iOS apps’ code. This means the code for all Proton apps out of beta, including all Proton Drive apps, is now available for anyone to examine. You can verify for yourself that these are doing exactly what we claim. 

You can find the code for the Proton Drive mobile apps on the Proton Drive apps GitHub(yeni pencere).

The code for every Proton Mail and Proton Calendar app, as well as the Proton Drive web app is on the Proton Mail GitHub(yeni pencere)

You can find the code for all Proton VPN apps on its GitHub page(yeni pencere)

Security through transparency

As an organization founded by scientists who met at CERN, we believe this level of transparency is not only essential to earning the trust of the Proton community, but it’s also how progress is made. By publishing our apps’ code, we make it available to the online network of security experts and white hat hackers. 

Their close scrutiny of our apps, which we incentivize through our Bug Bounty Program, ensures that any potential vulnerabilities are swiftly discovered and resolved. This approach of ‘security through transparency’ translates to better security and privacy for your personal information. 

Proton Drive apps have passed independent security audits

As part of making the Proton Drive mobile apps open source, we also subjected them to an independent security audit by Securitum(yeni pencere). Securitum is a respected European IT security company that has conducted security audits and tests for many of Europe’s largest companies. 

These reports allow you to get an expert assessment of our apps’ security if you don’t have the time or inclination to examine the code for yourself.

According to their report, Securitum found no outstanding vulnerabilities in our Android or iOS apps.

Read the security audit for the Proton Drive iOS app(yeni pencere)

Read the security audit for the Proton Drive Android app(yeni pencere)

You can also find the latest security audit reports for all Proton services on our community page explaining why we prioritize open-source code.

A better internet begins with open source 

We’ve been supporters of the open-source community ever since we made the Proton Mail web app open source in 2015. 

We maintain two of the most popular open-source cryptographic libraries, OpenPGP.js(yeni pencere) and GopenPGP,(yeni pencere) that make it easier for more developers to add secure encryption to their own apps and secure more data. 

We’ve also contributed to multiple open-source projects over the years through our Lifetime Account Charity Fundraiser, including WireGuard(yeni pencere), Qubes OS(yeni pencere), GrapheneOS(yeni pencere), and Tails(yeni pencere).

We believe this system of open development and peer review leads to better, more secure programs that keep all of our information secure. Thank you to the Proton community for enabling our work, and we invite you to contribute to our code yourself on GitHub. 

İlgili makaleler

The cover image for a Proton blog, showing a phone screen with a lock logo and three password fields surrounding the phone
en
Here's what to look for when choosing an enterprise password manager to streamline collaboration and protect your organization's sensitive data.
en
  • Gizlilik yol göstericileri
Learn how to unsend an email, how it’s useful for personal or business emails, and how Proton Mail can help.
Proton Mail and Proton Calendar winter product roadmap
en
  • Ürün güncellemeleri
  • Proton Calendar
  • Proton Mail
Preview upcoming updates to Proton Mail and Proton Calendar, including performance boosts, new features, and enhanced privacy tools.
Gantt chart displaying Proton Drive plans and development of new features
en
  • Ürün güncellemeleri
  • Proton Drive
Discover the tools, features, and improvements coming to Proton Drive’s secure cloud storage and document editor this winter and spring.
laptop showing Bitcoin price climbing
en
  • Gizlilik yol göstericileri
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial, self-custodial, hardware, and paper wallets.
pixel tracking: here's how to tell which emails track your activity
en
Discover what pixel tracking is and how it works, how to spot emails that track you, and how to block these hidden trackers.