When I first reviewed ProtonMail over a year ago, it was very much a fledgling service still in its alpha phase of development. Even back then, I thought it had great promise as long as its limitations were fully understood. Since then ProtonMail has introduced many new features, including premium accounts, the ability to send encrypted emails to non-ProtonMail users, mobile apps, and (perhaps most importantly of all) it has become fully open source.
Many aspects of the service, however, have not changed, so rather than reinventing the wheel, this article is an expanded and revised version of my original review.
- Country Switzerland
What is ProtonMail?
ProtonMail is privacy-focused webmail service designed to provide the functionality and ease-of-use of services such as Gmail, but which is secure and does not spy on its users’ communications in order to flog them stuff, or to hand over to the NSA.
It has been developed by a team of research students from MIT and Harvard, headed by Harvard PhD candidate and CERN researcher Andy Yen, and was initially crowdfunded by a wildly successful IndieGoGo campaign.
Interest in ProtonMail has been high, and it has struggled to accommodate new users, resulting in a waiting list before accounts are activated. This rather frustrating issue has many opting for the (also very good) Tutanota instead, which has no such waiting list.
Fortunately, waiting times have now dropped from the 8 months (!) that it took for me to receive an invitation over a year ago, to around 2 weeks (according to anecdotal reports). This may, however, remain an issue for the more impatient of you out there.
Update: Just 2 days after publishing this review, ProtonMail has opened up its subscription to all.
Pricing and Plans
One of the most important developments is the introduction of premium plans. The very useable free tier still exists (and ProtonMail has promised it will always continue to exist), but premium plans add some very useful features, such as custom domains and web addresses, plus increased storage and messages per day.
The ProtonMail Plus plan starts at $5 per month (or $4 per month if paid yearly), but can be customized further. The ProtonMail Visionary plan starts at $30 per month, and is clearly intended for businesses.
Custom Domains - if you have your own domain name, you can use this to send and receive encrypted messages using your ProtonMail account (for example at [email protected]).
ProtonMail Addresses - this is the number of @protonmail.ch or @protonmail.com addresses you can have. ProtonMail plans to add sorting features for these in a future release.
New keys are generated for each new custom domain or ProtonMail alias.
For casual users the free service will likely be more than sufficient, but for power users the premium extras make a welcome addition, and are an excellent way to help fund the service (remember, ProtonMail makes no money through advertising or selling your data to advertisers!).
- End-to-end encrypted emails
- Can send encrypted emails to non-ProtonMail users
- Self-destruct emails
- Improved web interface with drag and drop messages, contacts manager, authentication logs, and more
- Apps for Android and iOS
- Based in Switzerland (more on this later)
- Completely open source
- Public key export (to send to other PGP users and to verify messages manually)
That ProtonMail operates out of Switzerland is a big draw for many users, as Switzerland is outside US and EU jurisdiction, and has a reputation for very strong privacy laws. Surveillance directives must be obtained through the courts and with no gagging powers targets must be notified, technical interception of electronic communications is only permitted with regards to ISP’s and not “mere” Internet application providers (such as email services), etc.
Whether this reputation is entirely justified, however, is not so clear cut. It is often said, for example, that Swiss authorities have no interest in cooperating with the US and its allies, but as US tax evaders stashing their wealth in Swiss bank accounts found out in 2013, this is not always the case. Victor Vital, a trial lawyer at Barnes & Thornburg, told Wired that,
“People seem to think that data privacy laws in Europe or in foreign countries pose problems or would be a roadblock, but that’s just not the case, because under those treaties the countries obligate themselves to cooperate as broadly and as much as possible.”
Even more worrying is that powerful new surveillance laws (the Nachrichtendienstgesetzt (NDG) the “BÜPF) are being pushed for by the Swiss government in the wake of last year’s terrorist attacks in Paris, which will greatly expand the State’s surveillance powers.
Thanks to the Swiss system of democracy, the NDG is on hold until a national referendum is held on it in June, and ProtonMail was notable for campaigning to raise the 70,000 signatures required to bring this about. The BÜPF is “up for a vote in the Parliament’s spring session, but may be revised or delayed.”
I think it fair, therefore, to say that the situation is very much in the air, although ProtonMail claims it will not be affected by the NDG law, even if it is passed by the referendum.
ProtonMail accounts are protected by two passwords, the first of which is used to authenticate the user and retrieve the correct account (and which ProtonMail keeps a copy of), and the second is kept only by the user, and is used to decrypt their mailbox. As Micah Lee, a technologist at the Intercept who focuses on privacy and cryptography notes,
“It’s actually really nice that they have two sets of passwords. The login password gets sent to the server, and that’s how you prove that your username is actually yours. And the second is the mailbox password, which never gets sent to ProtonMail’s server. The second password runs in your browser and decrypts your messages there.”
Mail is stored encrypted on ProtonMail’s servers, so the ProtonMail staff has no access to them, and these servers themselves “utilize fully encrypted hard disks with multiple password layers so data security is preserved even if our hardware is seized.”
All messages sent between ProtonMail members are encrypted. Messages to non-ProtonMail members can also be sent encrypted, or can be sent unencrypted via regular plaintext email.
According to ProtonMail, no metadata is kept and it does not log the IPs users’ connect from (although there is technically nothing preventing it from doing this). As ProtonMail also points out, because messages are encrypted, there is no way for it to scan them in order to deliver targeted advertising.
Update: A major issue that I missed while initially writing this review (due to the fact that I used my existing ProtonMail account) is that ProtonMail now asks for human verification (often via SMS) while registering for a new account.
This is in many ways a quite understandable (and possibly necessary) precaution to prevent the service being abused by spammers and spambots, but it does completely undermine any notions of anonymity. Users not happy with providing an email or phone number can avoid doing so by upgrading to a premium account (which can be paid for anonymously using Bitcoins).
ProtonMail uses end-to-end encryption for encrypted messages, using “secure implementations” of the open source AES, RSA, and OpenPGP libraries (TLS 1.0, AES-128 CBC, DHE RSA handshake, and SHA3 hash authentication).
“Advanced features of our new certificate include Extended Validation (EV), 4096-bit RSA, SHA-256 hash, and Certificate Transparency (CT). Together with QuoVadis, we will continue to stay on the cutting edge of SSL certificate technology to ensure the highest level of security for ProtonMail users.”
A big issue we had with ProtonMail was that its software was not fully open source, but this has all changed, and it is now 100 percent open source. Unlike much open source code, however, ProtonMail’s has been extensively audited by a team of well-known and respected cryptographers who volunteered (for no payment) to oversee the project, looking for backdoors and other nastinesses.
So far so good, but the news is not all so rosy. As Yael Grauer from Wired explains,
“One of the big issues is that it isn’t easy to know whether a message sent to another ProtonMail user is being encrypted to the recipient’s correct public key, which is stored on ProtonMail’s keyserver. For example, if Alice sends Bob a message encrypted to his public key, it’s harder for anyone else to read the message. But since ProtonMail distributes the encryption keys to users, it has the technical ability to give Alice its own keys in addition to Bob’s, thus encrypting the messages in a way that would allow it to eavesdrop.”
This is a weakness shared by Apple iMessage, but which has been solved in apps such as Signal by verifying the public encryption keys.
When sending an encrypted email to non-users, the content of the email and any attachments are encrypted. Normal email metadata information is included in the header, however, including the sender’s email address, the time the email was received, and the Subject title (which can, of course, be very revealing).
The takeaway here is that ProtonMail is much more secure than “regular” webmail services, will be resistant to blanket surveillance (although it is 100 percent definite that the NSA and other security services will monitor ProtonMail accounts vigorously), and that ProtonMail will not spy on your email in order to sell your data to advertisers.
ProtonMail’s claim that it provides “anonymous email” should be taken with a healthy pinch of salt, however, and it should be clearly understood that using this service is nowhere near as secure as using a standalone email client with a good PGP plugin installed (see our tutorial on using Gpg4win), or even a browser with an add-on such as Mailvelope installed.
ProtonMail in use
Signing in requires you to enter two passwords...
Your account password, which is known by ProtonMail…
… and your mailbox password, which should be known only by yourself
Anyone familiar with webmail services will feel instantly at home with ProtonMail. The new 2.0 interface looks good, and works smoothly
Messages sent to other ProtonMail users are automatically encrypted, while messages sent to non-ProtonMail users can optionally be encrypted. Such messages will expire (auto-destruct) in 28 days, or earlier should you choose
The recipient receives a link to the encrypted message (plus the hint, if used). Note that this message will expire after one hour, but also note that no metadata is hidden
… and when they enter the password..
…they can read the message
If a message has expired then the link becomes dead
Although no mobile apps are currently available (still in Beta at the time of writing), ProtonMail’s responsive website design means that it looks great in a mobile web browser
Email Privacy Tester results
These are the same results I achieved when I tested almost a year ago, and were not as good as those from Tutanota even back then
- Much more secure than regular email
- Emails are not spied on for advertising purposes
- Easy to use and looks great
- Completely open source
- Can send encrypted emails to non-users
- Self-destruct emails
- Genuinely useful premium options (including own domains)
I wasn’t so sure about
- Nowhere near as secure as “proper” PGP email
- Benefits of being based in Switzerland are debatable
- Mobile apps still not available in Apple and Play Stores
- SMS verification at registration (can be avoided by upgrading to a premium account)
- Misrepresentation of the service as “anonymous”. It’s not
- Unspectacular Email Privacy Tester results
- Using ProtonMail will attract attention (not its fault, per se, but worth noting)
"NOT RECOMMENDED: Edward Snowden – If you are Edward Snowden, or the next Edward Snowden, and have a life and death situation that requires privacy, we would not recommend using ProtonMail. For extremely sensitive situations, it is simply not a good idea to use email as a medium for communication."
However, ProtonMail is a very easy to use webmail service (on par with Gmail and suchlike) that is much more secure than most such webmail services, and which will not (cannot) spy on all your correspondence in order to target advertising (as Google, Microsoft, Apple, et al. do).
Furthermore, while it is unlikely to be secure against targeted NSA attacks (and users should be aware that the NSA will likely target users of the service), ProtonMail for most purposes (including investigations by national law enforcement bodies) provides a high level of privacy, and being based in Switzerland, it should be resilient against many legal forms of attack.
In terms of usability, ProtonMail has added a ton of features since it first started that make it very viable alternative to mainstream webmail services, and the move to fully open source is very welcome.
In short, as long as it’s (considerable) limitations are recognized, using ProtonMail can be a positive step towards improving your privacy and resisting blanket government surveillance. Just don’t expect it to provide genuine anonymity, or to protect you if you are up to anything very illegal.