Key Takeaways
- ProtonMail is a secure, encrypted email service based in Switzerland, offering client-side encryption to ensure strict data privacy. It does not require personally identifiable information for account creation and does not track user IP addresses.
- ProtonMail offers a unique feature of self-destructing emails, which automatically delete in the recipient’s mailbox after a specified time. This feature only applies to encrypted emails sent to non-ProtonMail users.
- While ProtonMail has been praised for its secure and private platform, it may be challenging for individual and corporate users to transition from familiar platforms despite the enhanced security. ProtonMail’s future success may hinge on the balance between security/privacy and feature-completeness/familiarity.
As handy as email is for both personal and corporate communications, it’s often not very secure. Your private data can be used by service providers for various purposes, such as targeted advertising, and is at a risk of being exposed to government agencies upon request.
Whether you’re transmitting important documents such as confidential memos, patent designs, or even personal information, it’s worth considering ways to better protect your privacy. One very interesting option is ProtonMail.
ProtonMail is a web-based, encrypted email service that was founded in 2013 at the CERN research facility. It’s a free and open-source service, the code of which is available on GitHub.
ProtonMail uses client-side encryption to establish a zero-knowledge
system, in order to enforce strict data privacy and protection for its users.
Security Mechanisms of ProtonMail
Secure Email Servers
The ProtonMail email servers are located in Switzerland, and your data is protected by the Swiss Federal Data Protection Act, as well as the Swiss Federal Data Protection Ordinance. These laws are some of the strongest privacy protection laws in the world.
ProtonMail states:
As ProtonMail is outside of US and EU jurisdiction, only a court order from the Cantonal Court of Geneva or the Swiss Federal Supreme Court can compel us to release the extremely limited user information we have.
In addition to this, ProtonMail ensures that your data stays on its servers, so that it is never exposed on the cloud. ProtonMail claims that its primary datacenter (which itself is guarded by multiple passwords on a system level) is located under 1000 meters of granite rock, in a heavily guarded bunker that can survive a nuclear attack. Apart from the fact that your data may survive a nuclear holocaust, this also ensures an extra layer of hardware security.
End-to-end Encryption
ProtonMail uses SSL for communication between its servers and your computer. Although message data is already encrypted before being sent, SSL adds an extra layer of security, preventing man in the middle
attacks. ProtonMail requires two passwords — one for signing in and one for decrypting your mailbox. The latter cannot be recovered if you forget it.
Anonymity
ProtonMail doesn’t require any information that can be used to personally identify an account holder while signing up. Also, it doesn’t track or record information such as the user’s IP address. Since your emails are encrypted, there’s no way even for the staff to read your emails.
Secure Communication With Other Email Providers
Communication between ProtonMail users is encrypted by default, which is denoted by the presence of a blue-colored lock icon. In addition to this, ProtonMail also supports sending encrypted emails to other email providers such as Gmail, Yahoo and AOL via symmetric encryption. This is sent in the form of a hyperlink, which the recipient receives in an email. Here is a screenshot of the encrypted mail that I’ve sent from my ProtonMail account to Google Inbox:
The recipients are asked for a passphrase (to be shared via a secure channel) which is used to decrypt the encrypted message:
Upon correctly entering the passphrase, the message gets decrypted and is displayed as shown in the following screenshot:
Self-destructing Emails
There’s an additional feature that distinguishes this secure email service from its competitors. Encrypted emails can be set to automatically self-destruct in the recipient’s mailbox after a certain amount of time. This feature only applies to the encrypted emails sent to the non-users of ProtonMail (regular emails sent to non-ProtonMail users cannot be marked for self-destruction).
Product Walkthrough
Setting up an Account with ProtonMail
Currently, invitations have to be requested for setting up a new account at ProtonMail. The signup page says:
Due to high demand, we have hit our capacity limit. We are adding servers constantly and will send you an invitation as soon as possible.
I got a reply to the invitation request within a week. It asked me to set up two passwords. One password was for logging in to the account. In case you forget this password, a password reset link can be sent to your alternative email. Then it asked me for a password for encrypting my mailbox. This password cannot be recovered if you lose it, so take care.
Once you decrypt your mailbox and log in, you have a number for utilities available for jump starting your regular work. You can import your contact book to ProtonMail in either .vcf or .csv format. I was a Gmail user, so I was able to export my contact list via Google Contacts and import it to ProtonMail.
In the settings section, you can set your signature as well as your display name via the Account Settings tab. The Security tab allows you to keep records of the Authentication Logs for your mailbox, so this helps you to monitor who has accessed your account and from which IP address. The Appearance tab helps you to tweak various options, including a field to set up a custom CSS theme for a tailored look.
New Developments
On November 3rd, 2015, ProtonMail was hit by a very powerful DDOS attack that took the service offline for a few days.
ProtonMail recently started a GoFundMe crowdfunding campaign to raise $50,000 to help pay for systems to defend it against future attacks of large scale.
According to its Transparency Report (September, 2015), five out of five requests to access user data have been denied by ProtonMail. It was even featured in the highly popular television show, Mr. Robot (Season 1 Episode 8). ProtonMail is all set to launch its Android and iOS applications by the end of 2015, and invites for the beta versions of the mobile applications are available for $29 each.
Conclusion
ProtonMail has been widely appreciated in the popular media for its efforts to establish a secure, private and open-source messaging platform. I believe that end-to-end encrypted messaging services with open-source infrastructure like ProtonMail will form the basis of future professional communication systems.
Having said that, I feel that it’s difficult for individual users to leave a familiar email ecosystem for a more secure one, and for the corporate users to shift from Google for Work. Let’s see which side wins: Security/Privacy or Feature-Completeness/Familiarity.
Have you used ProtonMail so far? If yes, will you continue to use your old email account? If no, what are your concerns for not switching to ProtonMail?
Frequently Asked Questions about ProtonMail
How secure is ProtonMail?
ProtonMail is one of the most secure email services available today. It uses end-to-end encryption, which means that only you and the recipient can read the emails you send. Even ProtonMail cannot decrypt and read your emails. This level of security ensures that your private communications remain private.
Can I use ProtonMail on my mobile device?
Yes, ProtonMail has mobile applications for both Android and iOS devices. You can download these apps from the Google Play Store or the Apple App Store, respectively. The mobile apps have all the features of the web version, allowing you to send and receive encrypted emails on the go.
Is ProtonMail free to use?
ProtonMail offers a free version with basic features, which is sufficient for personal use. However, they also offer paid plans with additional features such as increased storage, priority customer support, and the ability to use your own domain.
How does ProtonMail protect my privacy?
ProtonMail is based in Switzerland, a country with some of the strongest privacy laws in the world. They do not log IP addresses, which means your emails cannot be traced back to you. Additionally, they do not sell your data to third parties.
Can I import my existing emails into ProtonMail?
Yes, ProtonMail provides a tool called ProtonMail Import-Export app which allows you to import emails from other email providers. This makes it easy to switch to ProtonMail without losing your existing emails.
Can I send encrypted emails to non-ProtonMail users?
Yes, you can send encrypted emails to non-ProtonMail users. They will receive a link to a secure page where they can read the email and reply securely.
Does ProtonMail support two-factor authentication?
Yes, ProtonMail supports two-factor authentication (2FA). This adds an extra layer of security to your account by requiring a second piece of information, in addition to your password, to log in.
Can I use ProtonMail with my custom domain?
Yes, if you have a paid ProtonMail account, you can use it with your own domain. This allows you to have a personalized email address while still benefiting from ProtonMail’s security features.
Does ProtonMail have a size limit for attachments?
Yes, the maximum size for attachments in ProtonMail is 25 MB. However, you can send larger files using ProtonMail’s file sharing service, ProtonDrive.
Can I recover my ProtonMail account if I forget my password?
Due to the end-to-end encryption, ProtonMail does not have access to your password. If you forget it, you will lose access to your past emails. However, you can reset your password and regain access to your account, but your past emails will remain encrypted and unreadable.
The above is the detailed content of Sending Secure, Encrypted Email with ProtonMail. For more information, please follow other related articles on the PHP Chinese website!

The rise of Chinese women's tech power in the field of AI: The story behind Honor's collaboration with DeepSeek women's contribution to the field of technology is becoming increasingly significant. Data from the Ministry of Science and Technology of China shows that the number of female science and technology workers is huge and shows unique social value sensitivity in the development of AI algorithms. This article will focus on Honor mobile phones and explore the strength of the female team behind it being the first to connect to the DeepSeek big model, showing how they can promote technological progress and reshape the value coordinate system of technological development. On February 8, 2024, Honor officially launched the DeepSeek-R1 full-blood version big model, becoming the first manufacturer in the Android camp to connect to DeepSeek, arousing enthusiastic response from users. Behind this success, female team members are making product decisions, technical breakthroughs and users

DeepSeek released a technical article on Zhihu, introducing its DeepSeek-V3/R1 inference system in detail, and disclosed key financial data for the first time, which attracted industry attention. The article shows that the system's daily cost profit margin is as high as 545%, setting a new high in global AI big model profit. DeepSeek's low-cost strategy gives it an advantage in market competition. The cost of its model training is only 1%-5% of similar products, and the cost of V3 model training is only US$5.576 million, far lower than that of its competitors. Meanwhile, R1's API pricing is only 1/7 to 1/2 of OpenAIo3-mini. These data prove the commercial feasibility of the DeepSeek technology route and also establish the efficient profitability of AI models.

Website construction is just the first step: the importance of SEO and backlinks Building a website is just the first step to converting it into a valuable marketing asset. You need to do SEO optimization to improve the visibility of your website in search engines and attract potential customers. Backlinks are the key to improving your website rankings, and it shows Google and other search engines the authority and credibility of your website. Not all backlinks are beneficial: Identify and avoid harmful links Not all backlinks are beneficial. Harmful links can harm your ranking. Excellent free backlink checking tool monitors the source of links to your website and reminds you of harmful links. In addition, you can also analyze your competitors’ link strategies and learn from them. Free backlink checking tool: Your SEO intelligence officer

Midea will soon release its first air conditioner equipped with a DeepSeek big model - Midea fresh and clean air machine T6. The press conference is scheduled to be held at 1:30 pm on March 1. This air conditioner is equipped with an advanced air intelligent driving system, which can intelligently adjust parameters such as temperature, humidity and wind speed according to the environment. More importantly, it integrates the DeepSeek big model and supports more than 400,000 AI voice commands. Midea's move has caused heated discussions in the industry, and is particularly concerned about the significance of combining white goods and large models. Unlike the simple temperature settings of traditional air conditioners, Midea fresh and clean air machine T6 can understand more complex and vague instructions and intelligently adjust humidity according to the home environment, significantly improving the user experience.

DeepSeek-R1 empowers Baidu Library and Netdisk: The perfect integration of deep thinking and action has quickly integrated into many platforms in just one month. With its bold strategic layout, Baidu integrates DeepSeek as a third-party model partner and integrates it into its ecosystem, which marks a major progress in its "big model search" ecological strategy. Baidu Search and Wenxin Intelligent Intelligent Platform are the first to connect to the deep search functions of DeepSeek and Wenxin big models, providing users with a free AI search experience. At the same time, the classic slogan of "You will know when you go to Baidu", and the new version of Baidu APP also integrates the capabilities of Wenxin's big model and DeepSeek, launching "AI search" and "wide network information refinement"

AI Prompt Engineering for Code Generation: A Developer's Guide The landscape of code development is poised for a significant shift. Mastering Large Language Models (LLMs) and prompt engineering will be crucial for developers in the coming years. Th

This Go-based network vulnerability scanner efficiently identifies potential security weaknesses. It leverages Go's concurrency features for speed and includes service detection and vulnerability matching. Let's explore its capabilities and ethical


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Zend Studio 13.0.1
Powerful PHP integrated development environment

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function
