Proton

Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty Switzerland(new window) and our new private bug bounty program made up of expert ethical hackers and security researchers.

Bug Bounty Switzerland has successfully led some of Switzerland’s largest bug bounty programs and public scrutiny initiatives. Thousands of security researchers have participated in their programs to secure Swiss companies, public sector organizations, and critical infrastructure. They will manage our private bug bounty program and help us build an even stronger security community around our products. 

We invite all sophisticated hackers and researchers with experience searching for, identifying, and addressing advanced hacks and techniques used by nation-states, criminal organizations, or other bad actors to apply for this program. We are specifically looking for demonstrated expertise in the following areas:

  • Finding vulnerabilities in mail and communication systems
  • Compromising encryption techniques
  • Compromising backend APIs
  • Hacking mobile applications, Windows, Linux, or Apple systems
  • Researching VPN technology

Proton will reward people for reporting vulnerabilities in our products. Key focus areas include:

  • Vulnerabilities that will compromise a Proton user’s personal data
  • Compromising Proton’s encryption (password leaks, private keys, etc.)
  • The ability to demonstrate unauthorized access to customer data (such as email, calendar, etc.)
  • Demonstrating EOP, sensitive information disclosure, or availability vulnerabilities in Proton products
  • Compromising Proton API or server infrastructure
  • Demonstrating the ability to compromise applications running on mobile devices, Windows, Linux, and Apple

Proton strives to maintain the highest software security standards for our products, and we pride ourselves on our ability to adapt and use the best security practices within our software development life cycle. We are committed to working closely with qualified security researchers to ensure that our products are as secure as possible. If you are interested in participating in this bounty program, you can apply at https://www.bugbounty.ch/proton(new window).

Related articles

A politician at a podium, a smartphone that's been unlocked, and the Reichstag building.
German regional politicians overall have good cybersecurity, but 3 regions had at least half of their regional MPs' email addresses appear on the dark web. Read more to find out which.
A Gantt chart showing progress through the product roadmaps.
  • Product updates
We're sharing the roadmaps for all our services so you can see what's coming and give us your feedback.
A laptop with a Gantt chart, representing the Proton Drive roadmap for spring 2025
  • Product updates
  • Proton Drive
This spring, we're adding long-awaited features in Proton Drive, like albums, folder sync on macOS, and new Docs formatting tools. See more.
This spring and summer, we’re rolling out some of the biggest updates yet to Proton Mail. Here’s a look at what’s coming soon.
  • Product updates
  • Proton Calendar
  • Proton Mail
This spring and summer, we’re rolling out some of the biggest updates yet to Proton Mail. Here’s a look at what’s coming soon.
the cover image for a proton pass blog giving a spring roadmap update. the image shows a desktop computer with a speech bubble with several password fields containing ticks
  • Product updates
  • Proton Pass
Get up to date with the Proton Pass product updates we made over winter and see what we have planned for spring
Proton Drive for Windows new update with the Optimize Storage feature
We've added a new Optimize Storage feature in Proton Drive for Windows to manage synced folders easily. See more updates you may have missed.