Proton

At Proton, we want you to be able to choose what happens to your personal information, which is why we’ve built a suite of encrypted services that put you in control. An integral part of giving you control is explaining exactly how our services work, including how they protect your information. This is the only way you can make an informed decision about who to entrust with the details of your life. 

Given the sensitive information you protect with your password manager, it’s crucial that you know exactly what’s happening inside it. Because Proton Pass is open source, anyone can inspect our code and ensure that the apps work as described.

You can find the source code for Proton Pass here:

Review the code for all Proton apps

Proton Pass has passed an independent security audit

While being open source means that anybody can audit our code, not everyone has the time, technical expertise, or interest to pore over our apps’ code. That’s why we also regularly commission and publish independent security audits for all our apps.

Proton Pass’s code underwent a security audit by the German security firm Cure53(new window) throughout May and June. We selected Cure53 to handle the Proton Pass audit because we wanted to ensure that Proton Pass received the most rigorous testing possible, and Cure53 has extensive experience investigating browser extensions and password managers. They tested all Proton Pass mobile apps, browser extensions, and our API.

Cure53 had this to say about Proton Pass, “Proton’s extensive and thorough security assessment by Cure53 showcased their commitment to maintaining a high-level of security. With a moderate number of findings and most security vulnerabilities limited in severity, the overall state of security across Proton’s applications and platforms is commendable”. 

These results reflect Proton’s deep security DNA and help validate many of the architectural decisions we made with Proton Pass. There are also password management-specific considerations that this audit helped raise to our attention. For instance, we missed a case where an attacker might control a subdomain on a domain where the user has an account and thus trick a user who isn’t paying attention into accidentally entering their credentials. 

All issues reported in the security audit have been resolved except for the medium severity issue PRO-01-003 WP1, which unfortunately cannot be resolved at this time due to a platform limitation in Android (the Android operating system doesn’t currently provide the information that would be required to solve this issue). You can read the Proton Pass audit report(new window) for yourself. You can also find the audit reports for all Proton services.  

Security you can trust and verify

As a company run by scientists (Proton was founded by scientists who met at CERN), we believe strongly in the scientific ethos of transparency and peer review. Proton’s security and privacy claims can be independently verified by others, and our open-source code allows our claims to be continually tested, verified, and even improved.

Instead of hiding vulnerabilities and relying on secrecy to maintain “security” like other companies, we subject all our services to rigorous public examination, allowing us to swiftly find and resolve any issues. 

For this reason, we also actively encourage the inspection and checking of Proton’s code through our public Bug Bounty Program.  If you have questions or comments about Proton Pass, its security audit, or our approach to open source, please share them with us! Join the conversation on Twitter(new window) and Reddit(new window).

Protect your passwords
Luo ilmainen tili

Related articles

Family photos linked by AI, suggesting that your family photos may be used for training AI
en
Learn how Big Tech uses family photos to train AI, how it affects you, and how to protect your privacy to keep your memories out of datasets.
Microsoft has announced that, starting in June, you’ll no longer be able to save new passwords in the Microsoft Authenticator app.
en
If you want to use Microsoft’s password management features, you now need to step deeper into Microsoft’s walled garden. There's another way.
An illustration of a photo containing a parent and their child, overlayed on a cloud and an open padlock
en
Is your family’s photo collection safe? We surveyed 2,000 UK parents to uncover the truth about cloud storage risks, data breaches, and protecting precious memories.
en
Albums in Proton Drive makes it easier than ever to store and manage photos and videos while protecting your memories with end-to-end encryption.
What is SSO and why is it useful for businesses?
en
SSO allows employees to securely access all their work apps with just one login. Here's how SSO works and why businesses should consider it.
adolescence and the internet we handed to kids
en
Adolescence shows how platforms shape kids in harmful ways. Here's why transparent, open digital education must lead the change.