Proton

December 6, 2017
Geneva, Switzerland

What is Proton Mail Bridge

Proton Mail Bridge is an innovative application designed to revolutionize encrypted email. After nearly two years of research and development, the company has solved one of the longstanding obstacles that has prevented the widespread adoption of encrypted email, that is, the need for end-user retraining and email behavior changes that usually lead to a loss in productivity.

“The Proton Mail Bridge is literally a bridge between the unencrypted and encrypted worlds in the sense that it allows your average user to benefit from the added security and privacy of end-to-end encryption without having to make any changes to their email usage behavior.” says Proton Mail co-founder Dr. Andy Yen, “This means email encryption is no longer limited to just the tech savvy and advanced users.”

The software acts as a layer between desktop email clients and Proton Mail’s encrypted email servers, handling all aspects of encryption, decryption, and key management in a way that is completely transparent to the end user. For the first time ever, it is possible to use encrypted email with Microsoft Outlook, Thunderbird, and Apple Mail without needing to install plugins, extensions, or make other modifications to users’ desktop email clients. The power of this approach is that users can continue to use email as they always have, without needing to make any changes to their existing workflow in order to use end-to-end encryption.

By conducting the encryption and decryption in a middleware between email servers and the user’s email client, the Proton Mail Bridge also enables full-text search of encrypted messages for the first time ever, as the native search capabilities of desktop email clients can be used without compromising the encryption.

“Over the past 3 years, we have built some of the world’s most useful encryption technologies that protect millions worldwide, but the Proton Mail Bridge is certainly the most innovative one, and the one that will have the most far-reaching impact,” says Dr. Yen, “Today’s launch accomplishes one of our long-standing goals of bringing security technology to the mainstream.”

For now, the Proton Mail Bridge officially supports Microsoft Outlook, Thunderbird, Apple Mail, although it can work with any IMAP/SMTP email client. The Proton Mail Bridge is currently available for Windows and MacOS, with a Linux version coming in early 2018.

For more details about Proton Mail Bridge, please refer to our launch blog post here.

Proton Mail’s media kit can be found here.(new window)

Proton Mail Bridge images can be found here(new window).

About Proton Mail

Proton Mail is headquartered in Geneva, Switzerland, near CERN (the European Organization for Nuclear Research) where the founding team met in 2013. Every day, the Proton Mail team, brought together by a shared vision of protecting civil liberties, works to advance Internet security and privacy. Since its inception, Proton Mail’s infrastructure has been located exclusively in Switzerland, under the protection of some of the world’s strongest privacy laws.

Media inquiries: [email protected]

Related articles

The cover image for a Proton blog, showing a phone screen with a lock logo and three password fields surrounding the phone
Here's what to look for when choosing an enterprise password manager to streamline collaboration and protect your organization's sensitive data.
  • Privacy guides
Learn how to unsend an email, how it’s useful for personal or business emails, and how Proton Mail can help.
Proton Mail and Proton Calendar winter product roadmap
  • Product updates
  • Proton Calendar
  • Proton Mail
Preview upcoming updates to Proton Mail and Proton Calendar, including performance boosts, new features, and enhanced privacy tools.
Gantt chart displaying Proton Drive plans and development of new features
Discover the tools, features, and improvements coming to Proton Drive’s secure cloud storage and document editor this winter and spring.
laptop showing Bitcoin price climbing
  • Privacy guides
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial, self-custodial, hardware, and paper wallets.
pixel tracking: here's how to tell which emails track your activity
Discover what pixel tracking is and how it works, how to spot emails that track you, and how to block these hidden trackers.