wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Proton mail

profile
kinnari shitap
Aug 23, 2022
0 Likes
0 Discussions
148 Reads

Proton Mail (also written as ProtonMail) is an end-to-end encrypted email service founded in 2013 in Geneva, Switzerland.Proton Mail uses client-side encryption to protect email content and user data before they are sent to Proton Mail servers, unlike other common email providers such as Gmail and Outlook.com.The service can be accessed through a webmail client, the Tor network, or dedicated iOS and Android apps.

Proton Mail is run by Proton AG (formerly Proton Technologies), which is based in the Canton of Geneva.The company also operates Proton VPN, Proton Drive and Proton Calendar. Proton Mail received initial funding through a crowdfunding campaign. Although the default account setup is free, the service is sustained by optional paid services. Initially invitation-only, Proton Mail opened up to the public in March 2016. In 2017, Proton Mail had over 2 million users, growing to almost 70 million by 2022.

In September 2020, Proton Mail helped found the Coalition for App Fairness, which aims to gain better conditions for the inclusion of their apps in app stores. Proton also founded the Coalition for Competitive Digital Markets, which brings together 50+ European tech companies supporting open, interoperable and competitive digital markets. In May 2022, Proton AG updated the visuals, user interface, and logos of all its products, including Proton Mail, to achieve a consistent design throughout its software. Proton Mail's subscription now includes access to all Proton VPN, Proton Calendar, and Proton Drive.


Comments ()


Sign in

Read Next

History of Money

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

1.1 basic elements

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

How to Run your First android App

Blog banner

Interrupts

Blog banner

Virtual Memory

Blog banner

Deadlock

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Kernel in Operating System

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Windows Operating System

Blog banner

Memory Management in Operating System

Blog banner

Way to make your meal healthier.

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Access management

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Deadlock in operating system

Blog banner

10 Unknown facts about India's Independence

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Clustering Techniques

Blog banner

I/O Management and Disk Scheduling

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Child labour

Blog banner

Service Operation

Blog banner

Evolution of the Microprocesor

Blog banner

Hey Aryan here

Blog banner

Deadlocks in Operating System

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Save Environment

Blog banner

Wrike

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Operating system

Blog banner

Telegram and it's features

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Visualization in Data Science

Blog banner

Computer Security

Blog banner