Proton

Proton Mail

Illustration of Proton Mail in iOS
en
  • Ürün güncellemeleri
  • Proton Mail
iPhone and iPad users can now change their default email app from Apple’s Mail to secure and private Proton Mail.
An illustration of Proton Mail's public keys.
en
  • Ürün güncellemeleri
  • Proton Mail
The batch GCD algorithm can extract secret keys from large databases of public keys. Proton Mail is secure against this vulnerability.
en
  • Ürün güncellemeleri
  • Proton Mail
Proton Mail has temporarily changed its certificate authority to Let’s Encrypt, a nonprofit certificate authority run by the Internet Security Research Group.
An illustration of the multi-account feature for iOS.
en
  • Ürün güncellemeleri
  • Proton Mail
Multi-account support is now available on the new version of Proton Mail iOS. Access all your Proton Mail accounts on the go with your iOS device.
An illustration of the Proton Mail Android app going open source.
en
  • Ürün güncellemeleri
  • Proton Mail
Our Proton Mail Android app is open source. We are committed to transparency and contributing to the open source and privacy tech community.
illustration of Proton Mail Android client security
en
  • Ürün güncellemeleri
  • Proton Mail
Our Android security model explains what our app does to secure Proton users’ data. This article outlines how we handle data and mitigate potential attacks.
Illustration of Proton Mail Bridge open source
en
  • Ürün güncellemeleri
  • Proton Mail
Our Bridge app is now open source for macOS, Windows, and Linux. Find links to the code and an independent security audit report.
Illustration of the Bridge security model
en
  • Ürün güncellemeleri
  • Proton Mail
You can use Proton Mail Bridge with IMAP/SMTP email clients. Here we explain the Bridge security architecture and how it protects your data.
protonmail bridge for linux
en
  • Ürün güncellemeleri
  • Proton Mail
Proton Mail Linux users can now connect their email accounts with the Thunderbird client.
Illustration of vulnerability disclosure
en
  • Ürün güncellemeleri
  • Proton Mail
This document describes the vulnerability disclosure policy our security team follows when we discover flaws in third-party products.
Illustration of a user using DKIM keys to stop a hacker spoofing their email.
en
  • Ürün güncellemeleri
  • Proton Mail
DKIM key management lets users rotate their keys manually, making it harder for attackers to spoof their email address.