Proton
Illustration of Proton Mail Bridge open source

We are one step closer to fully open sourcing all our apps. Proton Mail Bridge joins iOS and the web app as open source software, and it has also passed an independent security audit.

Trust and transparency are core values of Proton Mail. We want you to know who is on our team(new window) and how we protect your privacy(new window). Similarly, we want you to be able to see the code that makes up our apps and keeps your data safe. That’s why we have prioritized making all our apps open source.

You can view the code(new window) for Proton Mail Bridge for macOS, Windows, and Linux on our GitHub page.

Download Proton Mail Bridge

Why open source matters

Our effort to open source all Proton apps began in 2015 with our Proton Mail web app(new window), followed by our iOS app(new window). Earlier this year, we open sourced all of the Proton VPN apps(new window). And most recently, we published the code for our Android app(new window), which means all Proton apps that are out of beta are open source.

Proton Mail Bridge is a desktop application that allows you to fully integrate your Proton Mail account with any IMAP and SMTP email client, including Outlook, Thunderbird, or Apple Mail. Open sourcing the code lets anyone verify how the encryption process takes place through Bridge as the emails are transferred between your Proton Mail account and your desktop email app.

Security experts can now examine the Bridge code and submit any findings via our bug bounty program(new window). By leveraging the entire IT security community, we are making it more likely that potential vulnerabilities are quickly discovered and fixed.

A better Internet is possible with open source

Open sourcing all our apps is the culmination of our development approach.

We have long been an active member and supporter of the open source community. We contributed to the development of the open source VPN protocol WireGuard(new window), and we maintain two of the largest cryptographic libraries on the Internet, OpenPGPjs(new window) and GopenPGP(new window).

Because Proton is rooted in scientific rigor, transparency, and peer review, we believe in the open source ethos of showing your work. Users can verify our code and see how it works at any time. This leads to more secure and reliable digital products that integrate feedback from all our users and impact our whole community.

In the same spirit of transparency, we have contracted the information security firm SEC Consult to conduct an independent security audit, and we are publishing their full report here(new window).

You can also read our article describing the Bridge security model(new window). Raw code is only useful if you know how to read it. Providing this technical documentation helps more people understand the security features of Bridge.

Thank you for your support

All of this is possible because of our community. You allow us to continue prioritizing open source projects and furthering the Proton mission to build a safer Internet.

Make sure to check our blog and follow us on social media for more product updates.

You can get a free secure email account from Proton Mail here.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support.


Feel free to share your feedback and questions with us via our official social media channels on Twitter(new window) and Reddit(new window).

Related articles

The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.
Proton Lifetime Fundraiser 7th edition
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to win our most exclusive plan and fight for a better internet.
The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.