ProtonBlog(new window)

Privacy is a human right, which is why Proton makes all our services available for free. We believe everyone should be able to express themselves and choose what happens to their data, regardless of where they live or their ability to pay.

Unfortunately, authoritarian governments that try to limit the right to privacy and freedom of speech often attempt to block Proton Mail(new window). It has happened in Turkey(new window), Belarus(new window), and Russia(new window).

Often, you can use Proton VPN,(new window) our free, no-logs, open-source VPN service, to bypass these internet blocks, but in the face of advanced and persistent internet censorship, Tor remains one of the most effective solutions.

Proton becomes a Green Onion Member

Tor’s work closely aligns with our vision of building a better internet where privacy is the default. In fact, the Tor Project(new window), the organization that developed the Tor Browser and oversees the Tor network, helped us launch the first version of the Proton Mail onion site (websites on the Tor network are called “onion sites” because .onion is the top-level domain used on the Tor network) back in 2017.

Sadly, more and more governments are turning to internet censorship or shutdowns to control their citizens. This has made Tor, with its anonymous browsing and ability to bypass advanced internet blocks, a vital tool for fighting censorship. That is why we are pleased to announce that Proton now supports the development of Tor as a Green Onion Member(new window). This will allow us to work closely with the Tor Project team and improve your experience on the Proton web apps over Tor.

Access Proton Mail, Proton Calendar, and Proton Drive with the updated Tor site

As part of this collaboration, we have implemented a major update to the Proton Mail site, and have added Proton Calendar and Proton Drive Tor sites. You’ll enjoy a redesigned and easy-to-use inbox, calendar, and file storage while benefiting from Tor’s enhanced privacy protection.

More importantly, you can now sign up for your Proton account directly on our onion site, making it even easier for anyone to use Tor to bypass censorship and set up a Proton account.

With the new update to the Proton Tor site, you can use Proton Mail(new window), Proton Calendar(new window), and Proton Drive(new window) over Tor with the same convenience as our regular web apps.

Learn how to access the Proton Mail Tor site

While this level of anonymity is not necessary for everyone, it can be a lifeline for people if their government is implementing advanced censorship measures or if they are being targeted by hackers. Deciding the level of protection you need when using the internet is a part of determining your threat model(new window).

The fight for a better internet

At Proton, we believe everyone should be able to use the internet and express themselves without worrying about censorship or surveillance. Joining the Tor Project as a Green Onion Member is part of our work towards this goal. 

Our close collaboration with the Tor Project and our updated onion site will provide more ways for people facing advanced online surveillance and censorship to access our services.

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers