Proton Mail security checklist for new account owners | Proton (2024)

Proton Mail security checklist for new account owners | Proton (1)

This article explains how new Proton Mail account owners can maximize the security of their new account. Proton Mail secures your account with features including end-to-end encryption(new window); minimum tracking or logging(new window) of personally identifiable information; independently audited, open source cryptography(new window); zero access architecture(new window); and SSL secured connections(new window).

However, no system is 100% secure, and Proton Mail is no exception. That’s why we compiled a list of 11 key steps that reinforce the security Proton Mail offers.

We recommend that all Proton Mail users go through this checklist regularly. However, these steps are particularly important at the creation of your Proton Mail account. Starting off on the right foot builds a strong defense against any attempts to expose your data and creates good security habits.

Enable two-factor authentication (2FA)

2FA protects your account even if someone steals your password. When you enable 2FA, you must prove your identity using either a six-digit code generated by a 2FA authenticator app on a smartphone registered to your account or a physical security key registered to your account.

This is in addition to your Proton Account login details. Find out more about how to enable 2FA in Proton Mail.

Choose strong passwords and keep them safe

We recommend using a password manager that generates long, random passwords and stores them with end-to-end encryption. Never reuse passwords. Learn more about strong passwords(new window).

Don’t forget your password! You will not be able to read your old emails if you forget it, as the password is linked to your encryption key.

PGP encryption(new window) can dramatically improve the security of your communications. Proton Mail allows you to exchange end-to-end encrypted emails and attachments(new window) with Proton Mail and non-Proton Mail(new window) account owners in a simple, reliable way.

Encrypt and verify your contacts

Proton Contacts(new window) is the world’s first encrypted contacts manager. You have the ability to store certain contact details, such as phone numbers and mailing addresses, using zero-access encryption(new window) and digital signature verification(new window). These tools provide a cryptographic guarantee that no one has tampered with your contacts, not even us.

You can also use the trust Public Keys(new window) option when you receive a message from a trusted Proton Mail contact. The feature saves the contact’s public key and protects against tampering.

Note: Proton Mail has access to your contacts’ display names and email addresses in order to route your emails to the correct recipient and to provide advanced features such as auto-complete, spam filtering, and whitelists.

Check authentication logs

You can check your account for suspicious logins(new window) through the Authentication Logs feature available in your Proton Mail settings. Please note that Proton Mail will have access to your successful login attempts if you decide to keep this feature on.

Log out other sessions

If you are concerned that someone else has access to your account or you forgot to log off on a public device, you can log out remotely through your settings. Unless you explicitly log out or change your password, you will stay logged in to your account for up to six months. Learn more about logging out of other sessions(new window).

Beware of phishing

Proton Mail will never ask for your login credentials. Enter your credentials only into our official apps and websites:

  • mail.proton.me
  • account.proton.me
  • account.protonvpn.com

Proton Mail provides additional anti-phishing protection(new window) with PhishGuard, DMARC protection, and link confirmation. If you receive a suspicious email, never click on the links or download attachments.

Note that all legitimate emails from Proton will have an Official badge. Emails that claim to be from Proton but don’t have this badge are likely phishing attempts.

Report phishing to Proton Mail

If you receive a suspicious email, you can report it through our Report Phishing(new window) feature.

Enable AppKey for Proton Mail iOS app

If you have iOS, AppKey adds another layer of protection to your Proton Mail data.

If your device is compromised and an attacker gets the key that unlocks your Proton Mail data, AppKey stops the attacker from accessing the data by verifying their identity. The AppKey is directly correlated to your biometric information or your PIN.

Learn more about how AppKey works with Protonmail(new window)

Keep your devices safe

The most effective hacks are often also the most low-tech. Device theft is one. Keylogging software and other types of spyware are also concerns. Be aware of your physical security when traveling and in public, and always set a password for your device. If you are using a public computer, don’t forget to log off!

DO NOT click the link or open the attachments in emails from unknown or unverified senders, particularly if the attachment is a .zip or .exe file. They might contain malware that compromises your device or your accounts.

Mark the message as spam(new window) to send future messages from that sender directly to your spam folder.

Protect your Internet traffic with a secure VPN

Proton VPN sends your Internet traffic through an encrypted VPN tunnel(new window), so your passwords and confidential data stay safe, even over public or untrusted Internet connections. We designed Proton VPN focusing on security, drawing upon the lessons we have learned from working with journalists and activists in the field.

Following these 11 tips will strengthen the security of your account, but staying safe requires vigilance and work by both you and the person you are communicating with. To stay on top of privacy and security news, follow Proton Mail’s blog(new window) and social media(new window) for the latest announcements and releases.

If you have any questions or concerns, you can contact our support team(new window).

Proton Mail security checklist for new account owners | Proton (2024)

FAQs

Proton Mail security checklist for new account owners | Proton? ›

5. Enable two-factor authentication. Two-factor authentication (2FA) adds an additional layer of security to your email account by requiring you to prove your identity when you sign in. This means that even if your password is leaked or stolen by a hacker, they won't be able to access your account.

How to secure a Proton Mail account? ›

5. Enable two-factor authentication. Two-factor authentication (2FA) adds an additional layer of security to your email account by requiring you to prove your identity when you sign in. This means that even if your password is leaked or stolen by a hacker, they won't be able to access your account.

Is Proton Mail actually secure? ›

Is Proton Mail safer than Gmail? Yes. End-to-end encryption is king when it comes to data protection. All data stored on Proton Mail is encrypted, so neither hackers nor ProtonMail employees can read the contents of your messages.

How do I set up a new Proton Mail account? ›

Go to the Proton Account signup page in a web browser on your computer.
  1. In the Username box, enter the username you want to use for your free email address.
  2. In the Password box, enter a password at least eight characters long and type the password in again to confirm.
  3. Click Create account.

Which is more secure Gmail or Proton Mail? ›

ProtonMail vs Gmail: Using Different Email Providers

Gmail offers a wider variety of features for more personal use, whereas Proton Mail is strictly a secure email service, sending mail with end-end encryption. If security is number one on your list of email service properties, maybe Proton Mail is the one for you.

What is the Proton Mail controversy? ›

Proton AG — the Swiss company behind Proton Mail, the popular encrypted email service — came under fire in April for complying with a request from Spanish police for information about one of its users — a Catalan pro-independence activist. It's obvious why that was a controversial move.

What is the downside of Proton Mail? ›

One slight downside is that it requires you to provide an email upon sign-up. You'll have to enter either a current email address or a phone number. I never had to submit any of these when I signed up for other secure mail services like Hushmail or Tutanota. TRY UP TO 38% OFF PROTONMAIL HERE!

What is the security issue with Proton Mail? ›

The Sonar Research team discovered a Cross-Site Scripting vulnerability in the open-source code of Proton Mail. This issue allowed attackers to steal decrypted emails and impersonate their victims, bypassing the end-to-end encryption. Attackers have to send two emails, both of which have to be viewed by the victim.

Has Proton Mail ever been hacked? ›

Russian Phishing: Swiss-based Email Provider ProtonMail Hit By Cyber Attack.

Can I be tracked using Proton Mail? ›

Proton Mail's enhanced tracking protection protects your privacy in two ways: Spy pixel protection: We remove known email trackers whenever you receive an email. We also pre-load other remote images on your behalf using a proxy with a generic IP address and geolocation.

Why is Proton Mail not accepted? ›

Why sites block Proton Mail. Proton Mail can sometimes be blocked by accident because we're not yet as well known as some of the largest email providers. For example, to reduce spam, some forums only allow registration from well-known email providers like Yahoo, Outlook, Gmail, etc.

Can Proton Mail replace Gmail? ›

Choose a private alternative to Gmail. You should be able to choose what happens to your data. With Proton, our end-to-end encryption ensures only you have access to your emails.

Do I need a phone number for Proton Mail? ›

Our focus on privacy means that Proton Mail has to do things differently. Zero-access encryption prevents us from accessing user inboxes, and our focus on privacy means we don't require a phone number to create an account (unlike most other email services).

Is Proton Mail 100% secure? ›

Proton Mail's zero-access architecture means we can never access your emails. Emails from other service providers are instantly encrypted on our servers using your public key, meaning we do not have the technical ability to decrypt your messages. As a result, we cannot hand your emails over to anyone.

Is Proton Mail safe for banking? ›

Keep your financial documents secure

Proton Mail's end-to-end encryption (E2EE) keeps both your attachments and your emails secure. However, if you or your recipient uses an email provider that doesn't have E2EE, your attachments won't be encrypted.

Is there anything better than Proton Mail? ›

Canary Mail – Best ProtonMail Alternative Overall

Canary Mail is the most advanced and secure email client on the market. Just like ProtonMail, Canary Mail puts a strong focus on email privacy to keep your communications secure. Still, Canary Mail's email privacy features are more modern than ProtonMail's.

Can an email from Proton Mail be traced? ›

If you are harassed through an anonymous ProtonMail email, the email sender is very careful to hide his or her identity. You won't be able to track the IP address through the email itself. To locate an IP address through Proton Email, you need advanced cyber investigation tools.

Does Proton Mail have spam protection? ›

Proton Mail features an Allow List and a Block List that gives you manual control over the spam filtering process. These lists are uniquely customized for your account.

Top Articles
Understanding Taxes - Theme 3: Fairness in Taxes
Binance in India - How to start? [Easy Guide] - CoinCodeCap
The Tribes and Castes of the Central Provinces of India, Volume 3
Nybe Business Id
Maria Dolores Franziska Kolowrat Krakowská
What Are the Best Cal State Schools? | BestColleges
Athletic Squad With Poles Crossword
41 annonces BMW Z3 occasion - ParuVendu.fr
Braums Pay Per Hour
Indiana Immediate Care.webpay.md
Thotsbook Com
U/Apprenhensive_You8924
104 Whiley Road Lancaster Ohio
Shannon Dacombe
7 Fly Traps For Effective Pest Control
Apne Tv Co Com
Lake Nockamixon Fishing Report
Bend Pets Craigslist
Obsidian Guard's Cutlass
Nick Pulos Height, Age, Net Worth, Girlfriend, Stunt Actor
Saatva Memory Foam Hybrid mattress review 2024
Aldine Isd Pay Scale 23-24
Odfl4Us Driver Login
Ruse For Crashing Family Reunions Crossword
Acts 16 Nkjv
Ups Print Store Near Me
Mega Personal St Louis
Xfinity Outage Map Fredericksburg Va
Vernon Dursley To Harry Potter Nyt Crossword
Lines Ac And Rs Can Best Be Described As
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Helpers Needed At Once Bug Fables
From This Corner - Chief Glen Brock: A Shawnee Thinker
Rs3 Bring Leela To The Tomb
Mchoul Funeral Home Of Fishkill Inc. Services
Ewg Eucerin
Pdx Weather Noaa
Gina's Pizza Port Charlotte Fl
1987 Monte Carlo Ss For Sale Craigslist
Strange World Showtimes Near Atlas Cinemas Great Lakes Stadium 16
CARLY Thank You Notes
Ukg Dimensions Urmc
Blackwolf Run Pro Shop
Sofia With An F Mugshot
Borat: An Iconic Character Who Became More than Just a Film
Gw2 Support Specter
Caesars Rewards Loyalty Program Review [Previously Total Rewards]
Meee Ruh
Great Clips Virginia Center Commons
Nfhs Network On Direct Tv
Syrie Funeral Home Obituary
Latest Posts
Article information

Author: Chrissy Homenick

Last Updated:

Views: 6377

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Chrissy Homenick

Birthday: 2001-10-22

Address: 611 Kuhn Oval, Feltonbury, NY 02783-3818

Phone: +96619177651654

Job: Mining Representative

Hobby: amateur radio, Sculling, Knife making, Gardening, Watching movies, Gunsmithing, Video gaming

Introduction: My name is Chrissy Homenick, I am a tender, funny, determined, tender, glorious, fancy, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.