Proton

Proton launches new bug bounty program with partner Bug Bounty Switzerland

Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty Switzerland(new window) and our new private bug bounty program made up of expert ethical hackers and security researchers.

Bug Bounty Switzerland has successfully led some of Switzerland’s largest bug bounty programs and public scrutiny initiatives. Thousands of security researchers have participated in their programs to secure Swiss companies, public sector organizations, and critical infrastructure. They will manage our private bug bounty program and help us build an even stronger security community around our products. 

We invite all sophisticated hackers and researchers with experience searching for, identifying, and addressing advanced hacks and techniques used by nation-states, criminal organizations, or other bad actors to apply for this program. We are specifically looking for demonstrated expertise in the following areas:

  • Finding vulnerabilities in mail and communication systems
  • Compromising encryption techniques
  • Compromising backend APIs
  • Hacking mobile applications, Windows, Linux, or Apple systems
  • Researching VPN technology

Proton will reward people for reporting vulnerabilities in our products. Key focus areas include:

  • Vulnerabilities that will compromise a Proton user’s personal data
  • Compromising Proton’s encryption (password leaks, private keys, etc.)
  • The ability to demonstrate unauthorized access to customer data (such as email, calendar, etc.)
  • Demonstrating EOP, sensitive information disclosure, or availability vulnerabilities in Proton products
  • Compromising Proton API or server infrastructure
  • Demonstrating the ability to compromise applications running on mobile devices, Windows, Linux, and Apple

Proton strives to maintain the highest software security standards for our products, and we pride ourselves on our ability to adapt and use the best security practices within our software development life cycle. We are committed to working closely with qualified security researchers to ensure that our products are as secure as possible. If you are interested in participating in this bounty program, you can apply at https://www.bugbounty.ch/proton(new window).

Related articles

Proton Mail and Proton Calendar winter product roadmap
  • Product updates
  • Proton Calendar
  • Proton Mail
Preview upcoming updates to Proton Mail and Proton Calendar, including performance boosts, new features, and enhanced privacy tools.
Gantt chart displaying Proton Drive plans and development of new features
Discover the tools, features, and improvements coming to Proton Drive’s secure cloud storage and document editor this winter and spring.
laptop showing Bitcoin price climbing
  • Privacy guides
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial, self-custodial, hardware, and paper wallets.
pixel tracking: here's how to tell which emails track your activity
Discover what pixel tracking is and how it works, how to spot emails that track you, and how to block these hidden trackers.
A cover image for a blog describing the next six months of Proton Pass development which shows a laptop screen with a Gantt chart
Take a look at the upcoming features and improvements coming to Proton Pass over the next several months.
The Danish mermaid and the Dutch parliament building behind a politician and an unlocked phone
We searched the dark web for Danish, Dutch, and Luxembourgish politicians’ official email addresses. In Denmark, over 40% had been exposed.