The first thing that you need to do is install the Bridge application on the device. ProtonMail plans to release the source code for the Bridge application after the technical documentation of the code is done. This means that they may be accessed by anyone with local access to the device, and by programs that may dump data from it as well. One issue from a security and privacy point of view is that emails are not stored in encrypted form in the email client. Good news is that this means that you can run searches across all emails or part of them, and don't have to change the configuration of the email client in any way. This means that you interact with ProtonMail emails like you would with any other emails from other providers. The email client communicates via IMAP and SMTP with the Bridge which in turn encrypts or decrypts ProtonMail messages. It acts as a proxy if you will that powers the encrypting and decrypting of content. The ProtonMail Bridge application "sits" between the email client and the ProtonMail servers. Note: Bridge is only available for paying customers and not to free users of ProtonMail. The main benefit of the approach is that the program ensures the same level of security - end-to-end encryption and zero-access encryption - that ProtonMail offers. The free software program bridges the gap and makes ProtonMail available in desktop email programs. ![]() While you could download your keys to integrate them in other applications, it was not such a comfortable option. ![]() ProtonMail was available as a web-based version and in form of applications only back then. First in 2014 when the service was announced, and then just a month ago when we published our getting started guide. We reviewed ProtonMail twice in past years.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |