wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Proton mail

profile
kinnari shitap
Aug 23, 2022
0 Likes
0 Discussions
148 Reads

Proton Mail (also written as ProtonMail) is an end-to-end encrypted email service founded in 2013 in Geneva, Switzerland.Proton Mail uses client-side encryption to protect email content and user data before they are sent to Proton Mail servers, unlike other common email providers such as Gmail and Outlook.com.The service can be accessed through a webmail client, the Tor network, or dedicated iOS and Android apps.

Proton Mail is run by Proton AG (formerly Proton Technologies), which is based in the Canton of Geneva.The company also operates Proton VPN, Proton Drive and Proton Calendar. Proton Mail received initial funding through a crowdfunding campaign. Although the default account setup is free, the service is sustained by optional paid services. Initially invitation-only, Proton Mail opened up to the public in March 2016. In 2017, Proton Mail had over 2 million users, growing to almost 70 million by 2022.

In September 2020, Proton Mail helped found the Coalition for App Fairness, which aims to gain better conditions for the inclusion of their apps in app stores. Proton also founded the Coalition for Competitive Digital Markets, which brings together 50+ European tech companies supporting open, interoperable and competitive digital markets. In May 2022, Proton AG updated the visuals, user interface, and logos of all its products, including Proton Mail, to achieve a consistent design throughout its software. Proton Mail's subscription now includes access to all Proton VPN, Proton Calendar, and Proton Drive.


Comments ()


Sign in

Read Next

What are Virtual Machines

Blog banner

PPT methodology

Blog banner

Service transistion under difficult conditions

Blog banner

Monday. com App

Blog banner

Memory Management in Operating System

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Smartsheet

Blog banner

Man In The Middle Attack

Blog banner

Use case of K-means clustering

Blog banner

Race Condition

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Web Site

Blog banner

Security in Cloud Computing

Blog banner

What is M-commerce and how it's work

Blog banner

OS Assignment 3 Deadlock

Blog banner

Remote Work in 2026

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

ODOO

Blog banner

Why Data Security Is Important

Blog banner

Friendship

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Zero-Day Attack

Blog banner

Windows Operating System

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Question

Blog banner

1.1 basic elements

Blog banner

MOVEMBER

Blog banner

Deadlock

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Direct Memory Access

Blog banner

Flipkart

Blog banner

Linux VServer Architecture

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

A Deep Dive

Blog banner

Mesh Topology

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Objectives and functions of Operating System...

Blog banner