Proton

Proton launches new bug bounty program with partner Bug Bounty Switzerland

Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty Switzerland(nowe okno) and our new private bug bounty program made up of expert ethical hackers and security researchers.

Bug Bounty Switzerland has successfully led some of Switzerland’s largest bug bounty programs and public scrutiny initiatives. Thousands of security researchers have participated in their programs to secure Swiss companies, public sector organizations, and critical infrastructure. They will manage our private bug bounty program and help us build an even stronger security community around our products. 

We invite all sophisticated hackers and researchers with experience searching for, identifying, and addressing advanced hacks and techniques used by nation-states, criminal organizations, or other bad actors to apply for this program. We are specifically looking for demonstrated expertise in the following areas:

  • Finding vulnerabilities in mail and communication systems
  • Compromising encryption techniques
  • Compromising backend APIs
  • Hacking mobile applications, Windows, Linux, or Apple systems
  • Researching VPN technology

Proton will reward people for reporting vulnerabilities in our products. Key focus areas include:

  • Vulnerabilities that will compromise a Proton user’s personal data
  • Compromising Proton’s encryption (password leaks, private keys, etc.)
  • The ability to demonstrate unauthorized access to customer data (such as email, calendar, etc.)
  • Demonstrating EOP, sensitive information disclosure, or availability vulnerabilities in Proton products
  • Compromising Proton API or server infrastructure
  • Demonstrating the ability to compromise applications running on mobile devices, Windows, Linux, and Apple

Proton strives to maintain the highest software security standards for our products, and we pride ourselves on our ability to adapt and use the best security practices within our software development life cycle. We are committed to working closely with qualified security researchers to ensure that our products are as secure as possible. If you are interested in participating in this bounty program, you can apply at https://www.bugbounty.ch/proton(nowe okno).

Powiązane artykuły

A phone screen with a speech bubble with a phone number in it
en
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
en
  • Co nowego w obszarze ochrony prywatności
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.
Coinbase, the largest Bitcoin exchange in the US, suffered a data breach
en
  • Co nowego w obszarze ochrony prywatności
  • Proton Wallet
Coinbase employees sold sensitive personal information to attackers, including government IDs and BTC transaction history. Proton Wallet is built to avoid these risks.
Whistleblower's whistle. Journalists must use secure channels to communicate with whistleblowers.
en
  • Przewodniki dot. prywatności
Whistleblowers risk everything to expose the truth. This guide helps journalists keep their sources safe using secure tools like Proton Mail, Signal, and SecureDrop.
An image showing a phone screen with a child icon and three icons with '17+' '8-12' and '3-5' to indicate age ratings
en
  • Przewodniki dot. prywatności
Parents can help their children develop healthy screen habits by learning about dark design patterns — Proton investigates how