ProtonBlog(new window)

With Proton Mail version 3.14 we introduce PGP support, which includes import of PGP keys into Proton Contacts for encrypted communication with external PGP users, address verification with trusted keys, and several other improvements.

PGP Sending

All Proton Mail users can now associate public keys with individual addresses in their contacts to enable encrypted communication with addresses that use other PGP services. For this reason, we have added an Advanced Settings button next to each address as shown in the image below:

protonmail pgp sending interface(new window)

This opens a new modal with settings that can be personalized for each address individually:

protonmail address sending interface(new window)

Address verification

Proton Mail also allows you to trust public keys for each contact in order to enable address verification. Using trusted keys, a user can ensure that specific keys are used to encrypt the message for each contact. Because the contacts are signed, the server cannot tamper with these keys.protonmail address verification interface(new window)

Manage address keys

Previously, Proton Mail only provided the option to export your existing public keys. With Proton Mail 3.14, it is now possible to export both public and private keys for addresses, to generate new keys, to mark existing ones as obsolete or compromised, or to delete them.

protonmail email encryption keys interface(new window)

Improved session management

We have also added a new feature for managing your active sessions. In the Security tab in Settings (on the web version), there is now a Session Management section which shows the active sessions for the account. Here you can see which client was used to log in on the account and when. Individual sessions can be revoked, which will forcibly log out that session:

protonmail security 2FA interface(new window)

Option for reporting phishing messages

We are always working to improve our user experience by making sure the messages you receive are legitimate. However, there are cases when malicious messages do end up in our users’ mailboxes. For this reason we have added a new warning and a new report system for potential phishing messages. If a message is detected as a potential phishing attempt, a red banner is displayed, asking users to be cautious. Even if this banner does not show, but a message appears to be a phishing attempt, you can report it under the More menu with the new “Report phishing” option.

protonmail report phising security feature(new window)

New modal for expiring messages

The latest version of Proton Mail also brings an improvement to expiring messages(new window). If an expiration time is set, but it is not supported by some of the recipients, we display a new modal that lists required actions to enable expiration for all recipients. It is also possible to send the message without expiration.

Proton Mail new modal for expiring messages(new window)

Add multiple recipients from the composer

For easier use, we have added another feature enabling users to quickly add multiple recipients right from the composer. To do this, simply click on the “To”, “CC”, or “BCC” text in front of each corresponding field. This opens a modal with a list of contact, which makes it possible to search and select multiple addresses and add them to the respective fields.

add multiple recipients in protonmail(new window)

add multiple emails in protonmail(new window)

Detect nonexistent Proton Mail addresses

Another improvement to the composer is the detection of nonexistent Proton Mail addresses. In this case, the nonexistent address will be marked with a red rectangle as shown in the image below.

Detect nonexistent Proton Mail addresses(new window)

Option to remove a contact if you mark a message as spam

Messages from addresses saved as a contact are always delivered in the Inbox if no other custom filters(new window) are set up. This may cause spam messages(new window) to arrive in the Inbox if a contact’s account has been compromised or if the spamming address has been saved by mistake.

For this reason, it is now possible to mark a message as spam and have the option to also remove the sender from the contacts list.

Option to remove a contact if you mark a message as spam(new window)

As always, your feedback is very welcomed and appreciated. Feel free to let us know your thoughts on Twitter(new window) or Reddit(new window). If you have found a bug, please let us know through the Report Bug feature.(new window)

We wish you a productive day!

Sign up and get a free secure email account from Proton Mail.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan or donate. Thank you for your support!

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

is whatsapp safe for sending private photos
WhatsApp is the world’s leading messaging app, trusted by billions of people around the globe to send and receive messages. However, is WhatsApp safe for sending private photos? Or are there better ways to share photos online privately? Let’s find ou
passwordless future
With the advent of passkeys, plenty of people are predicting the end of passwords. Is the future passwordless, though? Or is there room for both types of authentication to exist side-by-side?  At Proton, we are optimistic about passkeys and have int
At Proton, we have always been highly disciplined, focusing on how to best sustain our mission over time. This job is incredibly difficult. Everything we create always takes longer and is more complex than it would be if we did it without focusing on
is icloud keychain safe
If you’re on any Apple device, you’re familiar with the iCloud Keychain, the Apple password manager. It’s a handy tool that stores passwords for you and helps you manage your logins.  For a program that stores all your most sensitive data in one pla
We recently announced that Proton Pass now supports passkeys for everyone across all devices. Universal compatibility is a unique approach to implementing passkeys, unfortunately. Even though passkeys were developed by the FIDO Alliance and the Worl
How to upload and share private video
Your private videos are for your eyes only. However, not all cloud storage services are good at storing videos securely, let alone privately. In this article we explain what you can do to keep file sharing companies from having access to the videos y
Many email services, citing security reasons, require a phone number for identity verification. This creates an unfortunate paradox in which you must give up a highly sensitive piece of personal data to Big Tech. But there are simple ways to create