Anti-abuse and account security at Proton | Proton (2024)

Proton Mail has automated anti-abuse systems to protect against the main types of abuse that pose significant risks to the Proton community. These systems may sometimes suspend accounts for safety reasons. Below, we discuss why accounts get suspended and how suspended accounts can be restored. Proton Mail’s anti-abuse team works 24/7, and you can always reach a real person if you have an issue with your account.

Types of abuse and security threats

As an encrypted email service, there are three main types of abuse with significant risks to our users:

Bulk email registrations

  • How it works: Attackers sign up for many Proton Mail addresses that they then use to sign up for other services, such as social media or e-commerce websites. Attackers then violate the terms and conditions of these other services or act abusively.
  • How it affects Proton services: Services that aren’t sophisticated at combating abuse may start blocking all accounts registered with Proton Mail, and then good users cannot use these services.

Account takeovers

  • How it works: Attackers log in to many good users’ accounts by fooling them with phishing attacks(new window), cracking weak passwords, or using passwords that were leaked from a breached service in hopes that the user reused the same password on multiple accounts.
  • How it affects Proton services: Attackers can see the user’s encrypted data, use their data to impersonate them, take over other services linked to their email, or use their account to send spam(new window).

Spam

  • How it works: Attackers send spam from many Proton Mail addresses to recipients on other email services.
  • How it affects Proton services: Recipients mark these emails as spam, causing Proton Mail IP and domain reputations to fall and get blocklisted, leading to email delivery issues for good users.

Since Proton Mail launched in 2014, we’ve provided free and easy-to-use secure email to anyone who wants more privacy online. Our focus on privacy means that Proton Mail has to do things differently. Zero-access encryption(new window) prevents us from accessing user inboxes, and our focus on privacy means we don’t require a phone number to create an account (unlike most other email services). For this reason, we need to be more sophisticated in detecting abuse and securing Proton Mail accounts in a privacy-preserving way. To date, these systems have protected millions of members of the Proton community from the above risks.

Blocking bulk signups

Because of the risk posed by bulk email registration, Proton Mail’s terms and conditions can’t permit anyone to create large numbers of free email addresses (there are possibilities for paid users, which we discuss below).

With over a million monthly signups, preventing bulk signups is too complex for human analysts to manage effectively. It requires automated systems that use machine learning models to cluster accounts controlled by the same actor.

When a cluster of free accounts grows too large, the system sends an email alert to some of the accounts, warning them that this is against our Terms of Service. If this warning is ignored and the bulk account creation continues, the system will suspend all accounts in the cluster.

As with any prediction system, there’s a tradeoff between false positives (blocking the accounts of good users) and false negatives (letting abusers create accounts). We try to minimize both, but inevitably, even though it’s rare, our system sometimes disables or blocks good users. We regret when this happens, but automated systems are required to prevent abuse that would otherwise impact good Proton Mail users.

If you’ve been impacted by our anti-abuse system and weren’t using Proton Mail for abusive purposes, please submit a report at https://proton.me/support/appeal-abuse.

Our team of analysts is available to review reports 24/7. They will quickly investigate the situation and help restore your account.

If you want to avoid such issues and support Proton in providing high-quality free services, consider upgrading to a paid account. Paid accounts can add custom domains and create multiple email addresses, including on premium Proton domains such as @pm.me.

With multiple addresses, you can use a different one for each external service (for example, one for a social media site and another for a crypto exchange) to keep your identities private. This also allows you to disable any address that you no longer want to receive email or spam with. If you need secure email for your organization, we also have business encrypted email plans with multiple accounts, automated SMTP sending, and dedicated customer support.

If you’re the operator of an internet service and have seen abuse, such as bulk registrations or spam coming from Proton, please let us know at https://proton.me/support/report-abuse or email us at [email protected]. Our team will carefully review each report, take appropriate action against abusers, and improve our systems to prevent future abuse.

Preventing account takeovers

Another reason our automated anti-abuse systems disable accounts is to protect users from having their accounts taken over. If we think an attacker has breached your account or is in imminent danger of being breached, we may proactively suspend your account to prevent the attacker from getting in, at least until we can get in touch with you.

To date, Proton Mail hasn’t had any data breaches or data leaks, and we don’t ever have access to your password thanks to our use of zero-access encryption and end-to-end encryption. Still, an attacker may obtain the password of an account. This could happen if you fall for a phishing attack(new window) or reuse a password from another service that was hacked.

To prevent account takeovers, we block accounts at risk of such attacks, which could lead to your account being disabled. If this happens to you, we might ask you to use your recovery method to change your password or get in touch with our Support team to secure your account.

To help you monitor your account security, we built mobile push notifications to alert you of each successful login. We may require a captcha or force a verification from any saved recovery methods for suspicious logins that we’re not confident enough to block. This is for your safety. Cumulatively, these defenses have reduced compromised accounts by over 80% in the last two years.

Proton is used by some of the world’s most high-profile journalists, leaders, and international organizations that are high-value targets for attackers. We strongly recommend using two-factor authentication, which adds a layer of protection to your account, and setting up a recovery phrase, which can recover data even if you forget your password.

If you are a high-profile public figure, deal with sensitive data, or think you might be a target for cyberattacks, you can take advantage of our Proton Sentinel program(new window). It provides advanced account security, enables you to monitor login attempts more closely, and lets you speak with Proton security analysts.

If you have any issues related to account recovery or security, please contact our specialists by emailing [email protected].

Reducing spam

Proton Mail also has a sophisticated in-house system that applies similar machine-learning techniques to email, mainly to fight spam(new window) and phishing attacks(new window). This system also includes PhishGuard, which automatically adds phishing warnings to emails that are likely spoofed(new window) or are part of a phishing attack. The system automatically learns from your feedback (for example, moving an email to spam, marking an email as phishing, or moving an email from spam to inbox) so it can quickly react to new attacks and improve its decisions if you disagree with its classifications. Our anti-spam system protects the Proton community from abuse and security threats and is at least 60% more effective than widely used spam filters such as SpamAssassin.

In addition to classifying incoming emails, this system works with our other anti-abuse systems to block bulk email registrations and outgoing spam from abusive Proton Mail accounts. Due to these systems and the global team that monitors for threats 24/7, Proton Mail has high-reputation IPs and domains that provide great email deliverability for the Proton community. If you have any issues with mail delivery or spam, please email our specialists at [email protected].

Looking forward

Abuse is an inevitable part of the internet because wherever there is freedom and opportunity, there will be bad actors trying to take advantage. And if a service has value and is easy to abuse, it will attract more abusers, and the experience and safety of users will suffer until the service has little value.

That’s why our fight against abuse and bad actors is a critical part of our work to support freedom and privacy on the internet.

We hope these efforts will make the Proton ecosystem the most secure and easy-to-use solution for anyone who wants to interact on the internet.

Anti-abuse and account security at Proton | Proton (2024)

FAQs

What is the anti abuse system in Proton Mail? ›

Proton Mail has automated anti-abuse systems to protect against the main types of abuse that pose significant risks to the Proton community. These systems may sometimes suspend accounts for safety reasons.

Why was my Proton account suspended? ›

Proton Mail temporarily locked my account for security reasons. If we think your account has been compromised, Proton Mail may temporarily lock it as a precaution. Follow these steps to unlock it.

Why is Proton Mail banned? ›

In response to hoax bomb threats that were sent through Proton Mail, some members of the Indian government suggested taking the extreme measure of blocking Proton. At Proton, we are resolutely against the use of Proton services for purposes that are contrary to Swiss law (Proton is a Swiss company).

Is Proton actually secure? ›

Is Proton Mail safer than Gmail? Yes. End-to-end encryption is king when it comes to data protection. All data stored on Proton Mail is encrypted, so neither hackers nor ProtonMail employees can read the contents of your messages.

Does Proton read your emails? ›

Proton believes your data belongs to you. That's why we use end-to-end encryption and zero-access encryption to ensure that only you can read your emails. We cannot read or give anyone else access to your emails.

Where is Proton Mail banned? ›

Proton Mail to be banned in India

Section 69A empowers officers to issue orders for content blocking in the interest of national security and public order.

Has Proton Mail been hacked? ›

The message was then followed by an attack (believed to be from the group called the Armada Collective, which has been responsible for extortion of several private email services), that flooded ProtonMail's IP addresses and knocking the service offline for approximately 15 minutes.

How to recover a suspended Proton Mail account? ›

How to unlock your account
  1. Verification code. Before logging in to your account, you may be asked to enter a code sent to your recovery email address or phone number. ...
  2. Change your account password.

How do I delete my suspended Proton account? ›

Sign in to the app and go to Settings → Account settings → [Your Proton Account name] → Delete account.

Which is safer Gmail or Proton Mail? ›

Still deciding between Proton Mail vs. Gmail? While Gmail scans your emails and lets third parties into your inbox, Proton Mail blocks all trackers and encrypts your messages so only you can read them. We believe you should be the one who chooses what happens to your data.

Can police track Proton Mail? ›

ProtonMail is encrypted, so you won't be able to track an email through ProtonMail, except through advanced methods which we will explain in this article. An IP (Internet Protocol) address is a set of rules that governs the format of data sent via a local network or the internet.

Is Gmail as secure as Proton Mail? ›

Gmail offers a wider variety of features for more personal use, whereas Proton Mail is strictly a secure email service, sending mail with end-end encryption. If security is number one on your list of email service properties, maybe Proton Mail is the one for you.

What is the most hacked email provider? ›

Yahoo! Mail has a blemished history regarding data security and privacy. The massive data breach of 2013, where every Yahoo account was affected, is a testament to the lax security measures in place. That's approximately three billion accounts compromised, making it one of the largest breaches in history.

Can Proton get hacked? ›

If you're blindly downloading and executing random files you'll get hacked. You need to use strong, unique passwords that can be generated through Proton Pass or any other password generator. Using 2FA will help immensely; however, if your devices are compromised then these things won't help you at all.

Does Proton take your data? ›

Our end-to-end encryption and zero-access encryption means that no one (not even Proton) has the technical means to access your data without your permission. We don't sell ads and can't share your data. At Proton, privacy isn't a promise, it's mathematically ensured.

What makes Proton Mail so secure? ›

The email is encrypted in transit using TLS. It is then unencrypted and re-encrypted (by us) for storage on our servers using zero-access encryption. Once zero-access encryption has been applied, no-one except you can access emails stored on our servers (including us).

Why is Proton Mail safer than Gmail? ›

Proton Mail is a private alternative to Gmail. Like everything you do online, Google tracks the way you interact with your Gmail account for advertising purposes. In contrast, Proton Mail's end-to-end encrypted email gives you an inbox free from ads, trackers, spying, and data harvesting.

Can a Proton Mail account be hacked? ›

An attacker may get your password through one of these methods: Leaked shared password: If you used your Proton Mail password with a different service, your password might have been leaked or sold if the other account was breached.

Can Proton emails be hacked? ›

Proton's custom-built PhishGuard system is designed to detect and flag potential threats without relying on scanning the contents of emails (since we can't see your messages because of end-to-end encryption). This means image-based attacks are no more effective in Proton than any other phishing emails.

Top Articles
How to Define Stakeholders for Your Software Development Project
IRS Guidance On Cryptocurrency Mining Taxes
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 6249

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.