Strong encryption at all times
Proton believes your data belongs to you. That’s why we use end-to-end encryption and zero-access encryption to ensure that only you can read your emails. We cannot read or give anyone else access to your emails. And this encryption happens automatically — no special software or tech skills required.
The easiest way to send end-to-end encrypted emails is if both the sender and recipient use Proton Mail. However, you can use our Password-protected Emails feature to send secure emails to people who don’t use Proton Mail.
Simply select a password in the composer before you click send, and your email will be inaccessible to both Proton and your recipient’s email provider.
2FA with hardware security keys
Keep your Proton Account safe. You can use hardware security keys to verify your identity via two-factor authentication (2FA). We support YubiKey and other U2F/FIDO2-compliant keys. Due to their physical nature, security keys are one of the best ways to protect your account, as online attackers cannot get their hands on them. No more reaching for your phone to open an authenticator app either.
Enhanced tracking protection
Your emails belong to you, which is why Proton Mail lets you read them without letting advertisers watch you, build a profile on you, or serve you ads based on your mail activity. Our web app automatically blocks tracking pixels and hides your IP address, so you can read your emails without exposing any personal information.
Proton Mail’s zero-access architecture means we can never access your emails. Emails from other service providers are instantly encrypted on our servers using your public key, meaning we do not have the technical ability to decrypt your messages.
As a result, we cannot hand your emails over to anyone.
It’s hard not to be impressed with the lengths Proton’s gone to shore up security and privacy.
Proton Mail is as easy to use as any webmail service, but it protects your message archive with zero access encryption and offers end-to-end encryption for message transmission. It's an effective solution for encrypted email.
Open source and independently audited for transparency
Founded by scientists, we believe transparency and peer review lead to better security for our community. All our apps are open source so that anyone can use and improve them. They have also been audited so that anyone can trust them.
Every app you use to access your Proton Mail inbox is available for inspection. Open sourcing our code increases the security of our apps because it allows us to leverage the global security community to search for vulnerabilities.
All Proton Mail code has been independently audited by third-party security experts. The results of those audits are publicly available on our website.
We have invested heavily in owning and controlling our own server hardware at several locations within Switzerland, so your data never goes to the cloud. Our data centers are located at highly secure sites that require biometric access. This provides an extra layer of protection by ensuring your encrypted emails are not easily accessible to third parties. On a system level, our servers utilize fully encrypted hard disks with multiple password layers, preserving data security even if our hardware is seized.
Built-in PGP support
Proton Mail users are more secure when they can use end-to-end encryption to communicate with everyone, not just other Proton Mail users. This is why we offer PGP support, which automatically encrypts messages using the public key of your recipient. In fact, you can use Proton Mail to replace your existing PGP client.
Proton Mail provides a seamless email experience in part because we manage encryption keys behind the scenes. With Key Transparency, Proton automatically checks your contacts’ public keys, so you can be sure you’re emailing the people you intend. This protects you against man-in-the-middle attacks and means you don't have to blindly trust Proton to use the correct keys.
Better security through privacy
Better privacy often leads to better security. Proton Mail offers both, empowering you with policies and tools to take control of what information about you is available online.
Proton Mail offers encrypted email over Tor through our onion site.
Connecting to Proton Mail over Tor helps prevent anyone monitoring your network from knowing you are using Proton Mail and provides access to your encrypted email account even if Proton Mail is blocked by your government.
Sometimes governments attempt to force their citizens to use less secure forms of communication by blocking access to encrypted services.
Alternative routing is another of our anti-censorship features that help ensure you can always access your email. If your connection is being blocked, Proton Mail apps will automatically seek alternative paths to establish a connection with our servers.
Built by and for our community
Thanks to our user-focused business model, Proton is able to work collaboratively to build products that put privacy and security first. This is reflected in the many ways we participate in the security community.
We developed and maintain an easy-to-use wrapper library written in Go as well as a fork of the original golang crypto library.
Because our code is open source, the Proton community benefits from security researchers around the world who participate in our bug bounty program.