all-in-one privacy solution":["Proton Unlimited tam kapsamlı bir gizlilik ve güvenlik çözümüdür"],"Black Friday":["Muhteşem Cuma"],"No ads. Privacy by default.":["Reklamsız. Privacy by default."],"People before profits":["İnsanlar paradan önce gelir"],"Security through transparency":["Şeffaflık ile güvenlik"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["En iyi Proton Mail ${ BLACK_FRIDAY } fırsatları"],"The world’s only community- supported email service":["Dünyanın tek topluluk tarafından desteklenen e-posta hizmeti"]},"specialoffer:limited":{"${ hours } hour":["${ hours } saat","${ hours } saat"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["${ hoursLeft } - ${ minutesLeft } - ${ secondsLeft } kaldı"],"${ minutes } minute":["${ minutes } dakika","${ minutes } dakika"],"${ seconds } second":["${ seconds } saniye","${ seconds } saniye"],"Limited time offer":["Sınırlı süreli teklif"]},"specialoffer:listitem":{"Create multiple addresses":["Birden adres oluşturun"],"Hide-my-email aliases":["Hide-my-email takma adları (e-posta adresi)"],"Quickly unsubscribe from newsletters":["Bülten aboneliğinden hızlı ayrılma"],"Use your own domain name":["Kendi etki alanınızı kullanın"]},"specialoffer:logos":{"As featured in":["Belirtildiği gibi"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Gizliliğinizi koruyan bir şifreli e-posta edinin"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Muhteşem Cuma İndirimleri - %40'a varan indirimler"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Bu Muhteşem Cuma'da Proton Mail aboneliklerinde %40'a varan indirimlerden faydalanın. Uçtan uca şifrelenmiş e-posta tarifelerimiz için muhteşem fırsatlardan yararlanın."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail Muhteşem Cuma İndirimleri - Güvenli e-postada %40'a varan indirimler"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* İlk yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*ilk 2 yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"30-day money-back guarantee":["30 günlük para iade garantisi"],"Billed at ${ TOTAL_SUM } for the first 2 years":["İlk 2 yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"Billed at ${ TOTAL_SUM } for the first year":["İlk yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"You save ${ SAVE_SUM }":["${ SAVE_SUM } tasarruf ediyorsunuz"]},"specialoffer:off":{"${ DISCOUNT } off":["${ DISCOUNT } indirim"],"${ PERCENT_OFF } off":["${ PERCENT_OFF } indirim"]},"specialoffer:testimonial":{"I love my ProtonMail":["ProtonMail'imi seviyorum"],"My favorite email service":["En sevdiğim e-posta hizmeti"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Hepimizi bu karışık internet evreninde güvende tuttuğun için teşekkürler Proton."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Ödediğinizin karşılığını alırsınız. Big Tech şirketleri söz konusu olduğunda, hiçbir şey ödememiyorsanız sizi kullanırlar. Gmail kullanmayı bıraktım ve @ProtonMail hizmetine geçtim"]},"specialoffer:time":{"Days":["Gün"],"Hours":["Saat"],"Min":["Dakika"]},"specialoffer:title":{"And much more":["Ve çok daha fazlası"],"Make your inbox yours":["Gelen kutunuzu kendize özel tutun"],"Safe from trackers":["İzleyicilerden güvende olun"],"Stay organized":["Düzenli kalın"],"Black Friday email deals":["Muhteşem Cuma e-posta fırsatları"],"Don’t just take our word for it":["Sırf bizden duymuş olmayın"],"Our story":["Öykümüz"],"Transfer your data from Google in one click":["Google'dan bilgilerinizi tek tıkla aktarın"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_COUNTRIES } üzeri ülkede ${ TOTAL_SERVERS } üzerinde sunucu, 10 aygıta kadar bağlantı, dünya çapındaki yayın hizmetlerine erişim, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Takviminizi bir bağlantı aracılığıyla ailenizle, arkadaşlarınızla veya iş arkadaşlarınızla paylaşın ve başka takvimleri görüntüleyin."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["1 özel e-posta etki alanı, 10 e-posta adresi, 10 hide-my-email takma adı, takvim paylaşma ve daha fazlası için destek içerir."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["3 özel e-posta etki alanı, 15 e-posta adresi, sınırsız hide-my-email takma adı, takvim paylaşma ve daha fazlası için destek içerir."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["25'ye kadar takvim yönetin, mobil uygulamalar, uçtan uca şifreleme ile koruma, Google'dan tek tıkla aktarma ve daha fazlası."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Şu anda Proton VPN hizmetiyle ilgili sorunlar yaşıyoruz"],"Learn more":["Ayrıntılı bilgi alın"]},"Status banner":{"Learn more":["Ayrıntılı bilgi alın"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Şu anda ${ issues[0] } hizmeti ile ilgili sorun yaşamaktayız, bilginize."],"We are experiencing issues with one or more services at the moment.":["Şu anda bir veya daha fazla hizmet ile ilgili sorun yaşamaktayız."]},"suggestions":{"Suggestions":["Öneriler"]},"Support":{"Sub category":["Alt kategori","Alt kategori"]},"Support article":{"${ readingTime } min":["${ readingTime } dakikalık","${ readingTime } dakikalık"],"Category":["Kategori","Kategori"],"Didn’t find what you were looking for?":["Aradığınızı bulamadınız mı?"],"General contact":["Genel iletişim"],"Get help":["Yardım alın"],"Legal contact":["Hukuki iletişim"],"Media contact":["Medya iletişimi"],"Partnerships contact":["Ortaklık iletişimi"],"Reading":["Okuma süresi"]},"Support categories":{"Browse Proton product support":["Proton ürün desteğine göz atın"]},"Support category":{"There is no article in this category yet.":["Bu kategoride henüz bir makale yok."]},"Support troubleshooting":{"--- Select ---":["--- Seç ---"],"App version":["Uygulama sürümü"],"Browser":["Tarayıcı"],"Check if this helps":["Yardımcı olabilecek bu cevaba bir göz atın"],"Choose a category for your question":["Sorunuz için bir kategori seçin"],"Choose a product":["Bir ürün seçin"],"Did this solve your issue ?":["Bu, sorununuzu çözdü mü?"],"Faster assistance is just a few clicks away — please make your selections":["Daha hızlı yardım birkaç tık uzağınızda, lütfen tercihlerinizi yapın"],"No, contact support":["Hayır, destekle iletişime geçin"],"Proton account":["Proton hesabı"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Geri bildiriminiz için teşekkürler"],"Troubleshooting":["Sorun giderme"],"What can we help with ?":["Ne konuda yardımcı olabiliriz?"],"Yes":["Evet"]},"support_modal_search_query":{"Search query":["Sorgu ara"]},"support_search_button":{"Search":["Ara"]},"support_search_i_am_looking_for":{"I'm looking for":["Şunu arıyorum: -"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Daha hızlı bir çözüm için, lütfen sorunu Bridge uygulamasının Yardım > Bir sorun bildir kısmından bildiririn."],"Information":["Bilgi"]},"SupportForm:option":{"Account Security":["Hesap Güvenliği"],"Contacts":["Kişiler"],"Custom email domain":["Özel e-posta etki alanı"],"Email delivery and Spam":["E-posta iletimi ve istenmeyen e-postalar"],"Encryption":["Şifreleme"],"Login and password":["Oturum ve şifre"],"Merge aliases and accounts":["Takma adları (e-posta adresi) ve hesapları birleştir"],"Migrate to Proton":["Proton üzerine aktarım"],"Notifications":["Bildirimler"],"Other":["Diğer"],"Plans and billing":["Tarifeler ve faturalandırma"],"Proton for Business":["Proton for Business"],"Sign up":["Hesap açma"],"Storage":["Depolama"],"Users, addresses, and identities":["Kullanıcılar, adresler ve kimlikler"]},"SupportForm:optionIntro":{"Select a topic":["Bir konu seç"]},"swiss_baseed_feature":{"Swiss based":["İsviçre merkezli"]},"Testimonial":{"Awards":["Ödüller"],"Customers":["Müşteriler"],"Featured":["Öne Çıkanlar"],"Go to testimonial source":["Müşteri görüşünün kaynağına git"],"Reviews":["İncelemeler"],"Videos":["Videolar"]},"Text":{"Find the plan that's right for you":["Size uygun tarifeyi bulun"],"If you need help, check out our ${ supportLink }.":["Yardıma ihtiyacınız varsa ${ supportLink } ziyaret edebilirsiniz."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Aradığınız sayfa kaldırılmış veya eski bir\nbağlantı olabilir."]},"Title":{"On this page":["Bu sayfada"],"Related articles":["İlgili makaleler"],"Share ${ thisPage }":["${ thisPage } paylaşın"],"Thank you!":["Teşekkürler!"],"this page":["Bu sayfayı"]},"Tooltip":{"More information":["Daha fazla bilgi"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["20'ye varan özel ve paylaşılabilir şifrelenmiş takvim oluşturun. Üstelik arkadaşlarınızdan, ailenizden, iş arkadaşlarınızdan ve kuruluşlardan 5'e kadar takvim ekleyin."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_COUNTRIES } üzeri ülkede ${ TOTAL_SERVERS } üzerinde sunucu, en yüksek VPN hızını, ${ TOTAL_VPN_CONNECTIONS } VPN bağlantısı, dünya çapındaki yayın hizmetlerini, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_COUNTRIES } üzeri ülkede ${ TOTAL_SERVERS } üzerinde sunucu, en yüksek VPN hızını, 10 VPN bağlantısı, dünya çapındaki yayın hizmetlerini, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."]},"version_history_label":{"Version history":["Sürüm geçmişi"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Her dosyanın ${ versionHistoryNumber } sürümünü ${ years } yıla kadar tutun"]},"vpn_features_link":{"View VPN plans":["VPN tarifelerini görüntüle"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Yasaklı içeriklere erişin ve gizlice gezinin"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
What is end-to-end encryption and how does it work? | Proton
The most private and secure way to communicate online is by using end-to-end encryption. If you send an end-to-end encrypted email, it’s encrypted on your device (your iPhone, Android, or laptop) and isn’t decrypted until it reaches the device of the person you sent the message to.
End-to-end encryption (E2EE) has historically been very complicated, which limited who could effectively use it. An early iteration of E2EE for email, known as Pretty Good Privacy (PGP), required you to handle the encryption keys yourself, making it notoriously difficult even for tech-savvy users.
However, recent technological advances in device capabilities and secure protocols have enabled services (such as Proton Mail) to make end-to-end encryption much easier to use. In fact, Proton Mail handles all end-to-end encryption automatically – you don’t need to do anything.
This article explains what end-to-end encryption is, how it works, and its advantages over other types of encryption.
Encryption is the process of scrambling data that people can read (for example, a plaintext email) into unreadable ciphertext that only authorized parties can decrypt using the right cryptographic key.
End-to-end encryption is the term used for a type of encryption where your data is encrypted at every stage of its journey from one device to another. The ends in “end-to-end” refer to the beginning and final destination of your data’s journey. For example, if you’re sending an email, the beginning point is your device and the destination is your recipient’s device.
This makes end-to-end encryption a secure communication method that prevents all third parties from accessing the content of your messages, including while they are transferred from one device to another or “at rest” on a server. When you use E2EE to send an email to someone, no one else can see the content of your message — not your network administrator, not your internet service provider (ISP), not hackers, not the government, and not even the company that handles the delivery of your email (for example, Proton Mail). They can’t read your email because your recipient holds the only key that can decrypt it.
How does end-to-end encryption work?
To understand how end-to-end encryption works for email, it helps to look at a diagram. In the example below, Bob wants to say hello to Alice privately. Alice has a public key and a private key, which are two mathematically related cryptographic keys. Alice can share her public key with anyone, but she must keep her private key secure and not let anyone else access it.
First, Bob uses Alice’s public key to encrypt his message, turning “Hello Alice” into ciphertext — scrambled, seemingly random characters.
Bob sends this encrypted message over the public internet. Along the way, it may pass through multiple servers, including those belonging to their email service and internet service providers. Although those companies may try to read the message (or even share it with third parties), it is computationally unfeasible for them to convert the ciphertext back into readable plaintext. Only Alice can decrypt the message with her private key when it lands in her inbox, as Alice is the only person with access to her private key.
If Alice wants to reply with her own end-to-end encrypted message, she would repeat the process, encrypting her message to Bob using Bob’s public key.
What is the difference between E2EE and other security paradigms?
End-to-end encryption is unique compared to other security paradigms because only the sender and receiver (the “ends” of the communication) can decrypt and read the data that has been encrypted. This differs from other security paradigms, such as point-to-point or in-transit encryption like the Transport Layer Security (TLS) protocol.
TLS is the security mechanism used in the HTTPS communication protocol that prevents hackers and your ISP(new window) from seeing what information you submit to websites (like your credit card number or address) and is responsible for encrypting most of the internet, including your connection to our blog right now. However, TLS is only implemented between endpoints of an HTTP channel. For example, as you’re reading our blog, HTTPS is using TLS to encrypt your connection between your device and our server.
This works fine if you are connecting to a website, but it’s insufficient if you’re sending an email. When you use a standard email provider, such as Gmail or Hotmail, all traffic toward it, including emails sent to you, will be protected in transit by TLS. The same is true in reverse; Emails you send from a standard email provider are also encrypted using TLS and sent to your recipient’s email provider . However, all TLS-protected traffic is decrypted once it arrives at these companies’ servers, including your emails. Most companies will then re-encrypt your messages while they are stored on their servers – using keys they control. This means that the company can decrypt and access the content of your messages at any time.
Services that use end-to-end encryption eliminate this possibility because the service provider does not actually possess the private key required for decryption. With Proton Mail or any other E2EE service, your private key is only available on your device, making E2EE much more secure and private.
Advantages of end-to-end encryption services
End-to-end encryption offers multiple advantages over other security paradigms. Protecting your data with E2EE makes you less vulnerable to leaks or attacks, prevents your government or ISP from snooping on you, and even helps defend democracy.
E2EE keeps your data safe from hacks
When you use end-to-end encryption, fewer parties can access your unencrypted data. Even if hackers compromised the servers where your encrypted data is stored (as was the case with the Yahoo Mail hack), they would not be able to decrypt your data because they would not possess your private key.
E2EE ensures data is not tampered with
When set up correctly, end-to-end encryption guarantees data integrity across the whole path of a message. This is particularly important when sharing information that might not be sensitive but must be delivered correctly in its original form.
E2EE keeps your data private
End-to-end encryption prevents anyone from accessing your data, including the email service you are using. In contrast, if you use an email service that does not use end-to-end encryption, such as Gmail, it can access every intimate detail stored in your emails at any time, for any reason, without you ever knowing. In fact, Gmail regularly gives third-party developers access to your emails(new window). Using an end-to-end encrypted email service gives you control over who can read your emails.
E2EE is good for democracy
Everyone has a right to privacy. End-to-end encryption protects free speech by preventing governments from accessing their citizens’ data and using the information stored in their emails to persecute or intimidate them. This is particularly important for dissidents, activists, and journalists who live under oppressive regimes.
How to use end-to-end encryption
Although you can set up end-to-end encryption yourself for some methods of communication, the easiest and fastest way to protect your privacy with E2EE is to use a service that implements it automatically for you.
As the first and largest end-to-end encrypted email provider, we protect millions of people every day. End-to-end encryption is the technological backbone of our vision for a more private and secure internet. When you use Proton Mail, your messages are automatically end-to-end encrypted whenever a public key is available for the recipient, including when you send an email to someone who uses Proton Mail or PGP.
You can use end-to-end encryption for free by signing up for a free Proton Mail account. With Easy Switch, you can also quickly transfer your emails and calendars to Proton from other, less private providers.
End-to-end encryption FAQs
What is ciphertext?
Ciphertext is unreadable encrypted data. An encryption algorithm scrambles plaintext (or human-readable data) into ciphertext, which can only be deciphered by a person or device that holds the unique decryption key. Without the decryption key, anyone who intercepted an encrypted message would only see ciphertext — an unreadable string of letters, numbers, and symbols.
What is encrypted with end-to-end encryption?
When you send an end-to-end encrypted message with Proton Mail, the message body and attachments are fully end-to-end encrypted whenever a public key is available for the recipient. If you email a contact who isn’t using Proton Mail or PGP, the message will only be end-to-end encrypted if you use our Password-protected Emails feature. Otherwise, your message will be encrypted in transit (in most cases) with TLS and will be readable by your recipient’s email provider. Proton Mail encryption explained
What are encryption keys?
An encryption key is a random string of bits used by an encryption algorithm to scramble plaintext into ciphertext. Some types of encryption use the same encryption key to encrypt and decrypt data (this is symmetric encryption), while others will have an encryption and a decryption key (this is asymmetric encryption). However, the most common encryption methodology is a combination of both, called hybrid encryption. Proton Mail’s end-to-end encryption protocol uses hybrid encryption.
What is PGP?
The most popular email encryption system in the world is PGP, which stands for Pretty Good Privacy. PGP is the encryption technique that transforms your messages into unintelligible ciphertext on your device before they are transmitted over the internet. Additionally, it verifies that the message was not altered while in transit and, if keys are obtained from a trustworthy source, it authenticates the sender’s identity. Proton Mail’s end-to-end encryption is based on an open-source version of PGP. Learn more about PGP
Compromised passwords are a common issue and probably one of the biggest
cybersecurity threats for regular people. How do passwords get compromised, and
is there anything you can do to prevent it?
* What does compromised password mean?
* How do pa
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online
service, you provide it with personal information that’s valuable to hackers,
such as email addresses, passwords, phone numbers, and more. Unfortunately, many
online services f
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a