all-in-one privacy solution":["Proton Unlimited tam kapsamlı bir gizlilik ve güvenlik çözümüdür"],"Black Friday":["Muhteşem Cuma"],"No ads. Privacy by default.":["Reklamsız. Privacy by default."],"People before profits":["İnsanlar paradan önce gelir"],"Security through transparency":["Şeffaflık ile güvenlik"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["En iyi Proton Mail ${ BLACK_FRIDAY } fırsatları"],"The world’s only community- supported email service":["Dünyanın tek topluluk tarafından desteklenen e-posta hizmeti"]},"specialoffer:limited":{"${ hours } hour":["${ hours } saat","${ hours } saat"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["${ hoursLeft } - ${ minutesLeft } - ${ secondsLeft } kaldı"],"${ minutes } minute":["${ minutes } dakika","${ minutes } dakika"],"${ seconds } second":["${ seconds } saniye","${ seconds } saniye"],"Limited time offer":["Sınırlı süreli teklif"]},"specialoffer:listitem":{"Create multiple addresses":["Birden adres oluşturun"],"Hide-my-email aliases":["Hide-my-email takma adları (e-posta adresi)"],"Quickly unsubscribe from newsletters":["Bülten aboneliğinden hızlı ayrılma"],"Use your own domain name":["Kendi etki alanınızı kullanın"]},"specialoffer:logos":{"As featured in":["Belirtildiği gibi"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Gizliliğinizi koruyan bir şifreli e-posta edinin"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Muhteşem Cuma İndirimleri - %40'a varan indirimler"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Bu Muhteşem Cuma'da Proton Mail aboneliklerinde %40'a varan indirimlerden faydalanın. Uçtan uca şifrelenmiş e-posta tarifelerimiz için muhteşem fırsatlardan yararlanın."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail Muhteşem Cuma İndirimleri - Güvenli e-postada %40'a varan indirimler"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* İlk yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*ilk 2 yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"30-day money-back guarantee":["30 günlük para iade garantisi"],"Billed at ${ TOTAL_SUM } for the first 2 years":["İlk 2 yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"Billed at ${ TOTAL_SUM } for the first year":["İlk yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"You save ${ SAVE_SUM }":["${ SAVE_SUM } tasarruf ediyorsunuz"]},"specialoffer:off":{"${ DISCOUNT } off":["${ DISCOUNT } indirim"],"${ PERCENT_OFF } off":["${ PERCENT_OFF } indirim"]},"specialoffer:testimonial":{"I love my ProtonMail":["ProtonMail'imi seviyorum"],"My favorite email service":["En sevdiğim e-posta hizmeti"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Hepimizi bu karışık internet evreninde güvende tuttuğun için teşekkürler Proton."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Ödediğinizin karşılığını alırsınız. Big Tech şirketleri söz konusu olduğunda, hiçbir şey ödememiyorsanız sizi kullanırlar. Gmail kullanmayı bıraktım ve @ProtonMail hizmetine geçtim"]},"specialoffer:time":{"Days":["Gün"],"Hours":["Saat"],"Min":["Dakika"]},"specialoffer:title":{"And much more":["Ve çok daha fazlası"],"Make your inbox yours":["Gelen kutunuzu kendize özel tutun"],"Safe from trackers":["İzleyicilerden güvende olun"],"Stay organized":["Düzenli kalın"],"Black Friday email deals":["Muhteşem Cuma e-posta fırsatları"],"Don’t just take our word for it":["Sırf bizden duymuş olmayın"],"Our story":["Öykümüz"],"Transfer your data from Google in one click":["Google'dan bilgilerinizi tek tıkla aktarın"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_VPN_COUNTRIES } üzeri ülkede ${ TOTAL_VPN_SERVERS } üzerinde sunucu, 10 aygıta kadar bağlantı, dünya çapındaki yayın hizmetlerine erişim, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Takviminizi bir bağlantı aracılığıyla ailenizle, arkadaşlarınızla veya iş arkadaşlarınızla paylaşın ve başka takvimleri görüntüleyin."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["1 özel e-posta etki alanı, 10 e-posta adresi, 10 hide-my-email takma adı, takvim paylaşma ve daha fazlası için destek içerir."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["3 özel e-posta etki alanı, 15 e-posta adresi, sınırsız hide-my-email takma adı, takvim paylaşma ve daha fazlası için destek içerir."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["25'ye kadar takvim yönetin, mobil uygulamalar, uçtan uca şifreleme ile koruma, Google'dan tek tıkla aktarma ve daha fazlası."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Şu anda Proton VPN hizmetiyle ilgili sorunlar yaşıyoruz"],"Learn more":["Ayrıntılı bilgi alın"]},"Status banner":{"Learn more":["Ayrıntılı bilgi alın"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Şu anda ${ issues[0] } hizmeti ile ilgili sorun yaşamaktayız, bilginize."],"We are experiencing issues with one or more services at the moment.":["Şu anda bir veya daha fazla hizmet ile ilgili sorun yaşamaktayız."]},"suggestions":{"Suggestions":["Öneriler"]},"Support":{"Sub category":["Alt kategori","Alt kategori"]},"Support article":{"${ readingTime } min":["${ readingTime } dakikalık","${ readingTime } dakikalık"],"Category":["Kategori","Kategori"],"Didn’t find what you were looking for?":["Aradığınızı bulamadınız mı?"],"General contact":["Genel iletişim"],"Get help":["Yardım alın"],"Legal contact":["Hukuki iletişim"],"Media contact":["Medya iletişimi"],"Partnerships contact":["Ortaklık iletişimi"],"Reading":["Okuma süresi"]},"Support troubleshooting":{"App version":["Uygulama sürümü"],"Browser":["Tarayıcı"],"Check if this helps":["Yardımcı olabilecek bu cevaba bir göz atın"],"Choose a product":["Bir ürün seçin"],"Did this solve your issue?":["Bu, sorununuzu çözdü mü?"],"Faster assistance is just a few clicks away":["Daha hızlı yardım birkaç tık uzağınızda"],"How can we help?":["Nasıl yardımcı olabiliriz?"],"No, contact support":["Hayır, destekle iletişime geçin"],"Please fill out one field after another":["Lütfen alanları tek tek sırayla doldurun"],"Please make your selections":["Lütfen seçimlerinizi yapın"],"Proton account":["Proton hesabı"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Geri bildiriminiz için teşekkürler"],"What can we help with?":["Ne konuda yardımcı olabiliriz?"],"Yes":["Evet"]},"support_modal_search_query":{"Search query":["Sorgu ara"]},"support_search_button":{"Search":["Ara"]},"support_search_i_am_looking_for":{"I'm looking for":["Şunu arıyorum: -"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Daha hızlı bir çözüm için, lütfen sorunu Bridge uygulamasının Yardım > Bir sorun bildir kısmından bildiririn."],"Information":["Bilgi"]},"SupportForm:option":{"Account Security":["Hesap Güvenliği"],"Contacts":["Kişiler"],"Custom email domain":["Özel e-posta etki alanı"],"Email delivery and Spam":["E-posta iletimi ve istenmeyen e-postalar"],"Encryption":["Şifreleme"],"Login and password":["Oturum ve şifre"],"Merge aliases and accounts":["Takma adları (e-posta adresi) ve hesapları birleştir"],"Migrate to Proton":["Proton üzerine aktarım"],"Notifications":["Bildirimler"],"Other":["Diğer"],"Plans and billing":["Tarifeler ve faturalandırma"],"Proton for Business":["Proton for Business"],"Sign up":["Hesap açma"],"Storage":["Depolama"],"Users, addresses, and identities":["Kullanıcılar, adresler ve kimlikler"]},"SupportForm:optionIntro":{"Select a topic":["Bir konu seç"]},"swiss_baseed_feature":{"Swiss based":["İsviçre merkezli"]},"Testimonial":{"Awards":["Ödüller"],"Customers":["Müşteriler"],"Featured":["Öne Çıkanlar"],"Go to testimonial source":["Müşteri görüşünün kaynağına git"],"Reviews":["İncelemeler"],"Videos":["Videolar"]},"Text":{"If you need help, check out our ${ supportLink }.":["Yardıma ihtiyacınız varsa ${ supportLink } ziyaret edebilirsiniz."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Aradığınız sayfa kaldırılmış veya eski bir\nbağlantı olabilir."]},"Title":{"On this page":["Bu sayfada"],"Related articles":["İlgili makaleler"],"Share ${ thisPage }":["${ thisPage } paylaşın"],"Thank you!":["Teşekkürler!"],"this page":["Bu sayfayı"]},"Tooltip":{"More information":["Daha fazla bilgi"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_VPN_COUNTRIES } üzeri ülkede ${ TOTAL_VPN_SERVERS } üzerinde sunucu, en yüksek VPN hızını, ${ TOTAL_VPN_CONNECTIONS } VPN bağlantısı, dünya çapındaki yayın hizmetlerini, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."]},"version_history_label":{"Version history":["Sürüm geçmişi"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Her dosyanın ${ versionHistoryNumber } sürümünü ${ years } yıla kadar tutun"]}}},"base":"blog","unleashApi":"https://account.proton.me/api","cdn":{"url":"https://pmecdn.protonweb.com/","enabled":"true"}};
window.frameworkContext = frameworkContext;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabled === 'true') {
return `${frameworkContext.cdn.url}${frameworkContext.base}/${filename}`;
} else {
return `/${frameworkContext.base}/${filename}`;
}
};
})();
If you’re comparing different password managers or researching password security, you’ll quickly run into terms like hashing and salting. While these terms might sound like steps you take to make breakfast potatoes, they’re actually processes that are essential to securing any online account.
This article explains what password hashing and salting mean, how they work, and why they’re necessary.
Hashing is a way to scramble information into a fixed-length string of letters and numbers. You can take unencrypted information, be it a password, image, or entire book, and feed it into a hash function, which turns that information into a hash value with a specific number of characters. For example, SHA-256, one of the most common hash functions, always creates 256-bit (32-byte) hash values.
Besides creating a fixed-length product, there are two other things that distinguish hashing from standard encryption. Hashing is:
Irreversible — You cannot “unhash” (or regenerate the original information) a hash value no matter what you do.
Deterministic — If you enter the same input information into a hash function, it will return the same hash value every time.
Unpredictable — It should be almost impossible to guess its resulting hash value for any given input information. In fact, if you can take a hash value and easily guess or create the input that would generate that hash value, then that hash function should be considered vulnerable and avoided.
These three characteristics make hashing a good way to securely store and verify passwords.
Hashing, password storage, and password authentication
When you create a new online account, you invariably provide a username (usually your email address) and create a password. This lets the service know who you are and verify that it’s actually you.
But the password creates a tricky problem for service providers. They essentially have three options. They can store your password in plaintext, encrypted, or hashed.
It doesn’t take a cybersecurity expert to see the problems with storing passwords in plaintext. This would let the service access your account whenever it wants, and your password would be exposed if there was ever a breach.
Encryption also doesn’t work. If a service encrypts a password using keys it controls, it can still access your password whenever (and potentially expose it in a breach). And it can’t encrypt your password using a key it doesn’t control (a key that’s on your device, for example) because that doesn’t allow it to verify that your password is correct when you log in.
Hashing is a good compromise. Because hashing is irreversible, services can store your password and assure its users that it can’t access their accounts and that their passwords will be safe in a breach.
And because hashing is deterministic, a service can verify a password by comparing the two hash values. If the hash values match, the service knows the input information (the passwords) match, even if the service doesn’t know what the actual password is.
It’s a clever system, but hashing has an issue with predictability. If you assume that one of the most common passwords for any service will be “password”. With this information, you can probably find the accounts that use “password” simply by looking at the most repeated hash values.
In fact, there is a cyberattack devoted to cracking hashes using so-called rainbow tables, which compile hashes and try to make sense of the rules governing them in large tables. They’re effective exactly because hashes are predictable.
Password salting
To minimize a hash function’s predictability, programmers use salting. Salting is a technique that takes the predictable hash function and adds some extra “flavor” — hence the term “salt” — in the form of unpredictability. A salt is a short set of random characters added to each password before it’s hashed.
What makes a salt special is that each one is unique to each user. If you create a password with a service, it’s assigned a salt that nobody else has. If you change your password, some services will use a new salt to go with it. This essentially ensures that no password (and therefore, no hash value) is ever repeated as long as a new, random salt value is used for each new password.
This makes the task of any would-be attacker a lot harder. Their rainbow tables are useless since salting makes the hash values unpredictable. All that remains is to make sure that your password is random enough to deter any dictionary attacks.
How we secure passwords at Proton
At Proton, we put our users’ privacy and security first. We never send your password to our servers, relying instead on the Secure Remote Password (SRP) protocol. SRP allows a user to authenticate themselves to a server (and vice versa) by proving that they know the password without sharing the password itself or any information that an attacker could use to derive the password (like a hash sum, for example). Your password remains secure on your device.
We do use hashing and salting, but for your account keys. Once you successfully log in, Proton sends your account keys to your client. Your client then salts and hashes your password using bcrypt and uses the resulting hash value as the key to decrypt your account key. Once your account key is decrypted, it can then be used to access your emails, calendars, etc. This process happens locally on your device so your password and hash never leaves it.
You can extend this level of protection to your other accounts as well with Proton Pass, our end-to-end encrypted password manager.
As you can read in our full breakdown of the Proton Pass security model, we end-to-end encrypt your passwords individually as well as the vaults where you store them, preventing anyone, including us, from being able to see your items at any point in the transfer process.
We can offer this kind of enhanced security because we’re funded entirely by you, our users. Without shareholders or venture capital investors to worry about, we can focus on developing tools that offer the very best in security and usability without cutting costs or corners. The result is a service that puts you first, whether it’s having the best encryption technology or offering a best-in-class interface. If that sounds like something you would like to try for yourself, join Proton Pass today.
Struggling to keep track of all your passwords? You’re not the only one.
Password managers exist because it’s difficult to keep track of hundreds of
logins and all their various passwords. It’s likely you have saved passwords on
your devices for conv
Cyberattacks aren’t always executed through sophisticated methods like
man-in-the-middle (MITM) attacks on public WiFi. Sometimes, they rely on
something as simple as looking over your shoulder.
Shoulder surfing attacks are when someone watches you
Proton prioritizes our community’s privacy and data security in every aspect of
our business.
To further demonstrate our commitment, we underwent a rigorous external audit
and – on May 2, 2024 – received our ISO 27001 certification.
As an organiz
Anyone with an iPhone can now enjoy Proton Drive’s secure and private photo
backup capabilities. This feature is gradually rolling out to the Proton
community and will be available to everyone by the end of this week.
Smartphones have made us all am
From the very beginning, Proton has always been a different type of
organization. This was probably evident from the way in which we got started via
a public crowdfunding campaign that saw 10,000 people donate over $500,000 to
launch development. As
Your online data is valuable. While it might feel like you’re browsing the web
for free, you’re actually paying marketing companies with your personal
information. Often, even when you pay for services, these companies still
collect and profit from y