u/Proton_Team

Introducing Proton Pass for AI Agents: Give Automations the Access They Need (and Nothing More)

Introducing Proton Pass for AI Agents: Give Automations the Access They Need (and Nothing More)

AI agents can save you tons of time by automating repetitive tasks. But there's a catch: to actually be useful, they often need access to sensitive information like passwords and API keys. That's where security gets tricky.

Today we're launching access tokens for AI agents in Proton Pass . This gives you granular control over what credentials agents can access with full visibility of when they use them.

How It Works

Pass for AI Agents

Create access tokens in seconds. Go to your Proton Pass settings and generate secure tokens specifically designed for AI agents. You can set these up and start deploying automations in minutes.

Grant only what's needed. Instead of handing over your master password or full credentials, agents get access to the vault(s) that you enable them to access. You can also set an expiration for each token, from one hour to one year, after which it can no longer be used. 

You can also know what they're doing. Every time an agent needs credentials, it has to tell you why, so you stay in the loop on what they’re up to. 

Access tokens are included with no additional cost on:

  • Pass Plus
  • Proton Unlimited
  • Pass Family
  • Pass Professional
  • Proton Workspace

Agentic AI doesn't have to come at the cost of your security. Now you can get the productivity boost you need while keeping complete control over your sensitive data.

Stay safe,
The Proton Team

Read more: https://proton.me/blog/pass-access-tokens

reddit.com
u/Proton_Team — 14 hours ago

How The Cartels Are Winning the Digital Drug War | Proton Data Wars | VICE News

When we think about the War on Drugs, we tend to picture police kicking down doors or busting dealers on the street. But these days, the drug war is just as much about huge networks of surveillance, data analysis and digital espionage. And this spying isn’t just being carried out by the cops.

Made by Proton, Data War is a series investigating the hidden battles shaping our digital world from mass surveillance and cybercrime to the fight for privacy and human rights online. As governments, corporations and criminals battle for control of our data, the series reveals why digital freedom, personal privacy and the tools we use to protect ourselves have never mattered more.

In this episode we’re looking at how Mexican drug cartels are hacking US law enforcement, monitoring entire cities through their CCTV system – and importing cutting edge military technology from the world’s deadliest war zone.

youtube.com
u/Proton_Team — 1 day ago

If you don’t control your data, who does? A European strategist explains

“What’s the problem?”

That was the response Austrian data strategist Fritz Fahringer got when he raised concerns about companies using private emails to train AI systems when he spoke to an employee at a major US tech company.

The exchange stayed with him. It reinforced something he had already seen firsthand: In parts of the global tech ecosystem, access to customer data is more than a technical capability. It’s a business model.

To Fahringer, that represents a growing breach of trust between technology providers and the organizations that depend on them.

proton.me
u/Proton_Team — 2 days ago

Photos and albums now load way faster on web

Check it out for yourself and let us know what you think!

u/Proton_Team — 3 days ago

Why are passwords still a leading cause of data breaches?

Most people use passwords every day, so it’s easy to forget that they can cause an extraordinary amount of damage if not managed properly. Most teams know they should use strong passwords, avoid reuse, enable two-factor authentication (2FA), and store credentials securely. But password-related breaches happen every day, not only in large enterprises but also in small teams managing a growing mix of SaaS tools, shared accounts, and fast-moving workflows.

Our latest Proton Pass blog examines why password-related breaches still happen: https://proton.me/business/blog/password-security

u/Proton_Team — 7 days ago

How Google Tracks Everything You Do and How to Stop It

Our latest video is one to share with anyone you think it might benefit.

We'll walk through six major Google services and show exactly what each one collects, why Google wants it, and where that information can ultimately end up.

youtube.com
u/Proton_Team — 8 days ago

Proton Pass found to be exceptionally robust in security audit

Recurity Labs (ISO 27001-certified) conducted a comprehensive security audit of all Proton Pass apps between January and April 2026 and rated our security posture as "well above par." No remote exploits or encryption bypasses found. 

The audit found:

No remote exploits: Users cannot be hacked simply by visiting a malicious website or clicking a link.

No encryption bypasses: Attackers can't use shortcuts, backdoors, or weak keys to bypass the encryption layer. 

Security audits are primarily an opportunity to test and improve our implementations. We're grateful to the auditors at Recruity for helping us identify several areas for improvement beyond the core security requirements. 

Proton took these findings seriously and chose to implement fixes even for areas that fell outside our immediate threat model. 

During the retest, the desktop memory-handling issues were all resolved, demonstrating our commitment to acting on expert feedback and continuously improving our security posture."

You can read more, as well as access the audit on our blog: https://proton.me/business/blog/proton-pass-audit-2026

u/Proton_Team — 10 days ago

REMINDER: Proton Pass can store a whole lot more than just credentials.

In case you didn't know, Proton Pass can store a range of different item types, even notes.

https://preview.redd.it/4m8m56a09j0h1.png?width=1200&format=png&auto=webp&s=7fc5723f9427cdee2df40523fb438b5344ebdca3

Securely store, share, and autofill your data with Proton Pass, the end-to-end encrypted password manager trusted by millions.

What are you storing that's out of the ordinary in Pass?

reddit.com
u/Proton_Team — 10 days ago
▲ 419 r/ProtonMail+1 crossposts

‘Price Of Free Gmail’—Some Google Accounts Worth $180,000

Gmail isn't free; according to our analysis, featured recently in Forbes, users are worth between $30 and $180,000.

It just depends how valuable advertisers think they are.

forbes.com
u/Evan_Spectre_the_One — 13 days ago

Happy World Password Day / Microsoft Edge Story

Happy World Password Day! On this day, observed annually on the first Thursday of May, we talk about passwords, why they're good, and how they can be better.

The idea originated from security researcher Mark Burnett, who proposed a “password day” in his 2005 book Perfect Passwords. Intel Security picked it up in 2013 and officially declared the first Thursday in May as World Password Day. Today, it is recognized globally by governments, corporations, schools, and cybersecurity organizations.

Let's talk about something that happened yesterday. A security researcher disclosed a serious vulnerability in how Microsoft Edge handles stored passwords.

When people storing passwords in the browser open Microsoft Edge, it loads every single saved password into memory in plaintext form. All of them. Decrypted and readable. All at once.

This doesn't sound like much until you understand what it means for security.

When passwords are stored on your device, they should be encrypted; when you need to use a password (like for autofill) the browser eventually has to decrypt it back into readable form. That's normal and expected.

The question is: how much password data should become readable at once?

Edge decrypts and loads all passwords into memory when the browser starts up. They just sit there in plaintext form, all the time you're using the browser.

The researcher tested this across multiple Chromium-based browsers and found that only Edge behaves this way.

Why This Is Dangerous

If an attacker gained sufficient access to your system, through malware, a compromised application, or physical access, they could inspect the browser's memory and potentially access all your passwords at once.

When this was disclosed, Microsoft said this behavior is "by design."

If you know someone who is using Edge's password manager, here's what they should do:

  1. Stop using Edge's password manager - Switch to a dedicated password manager that's designed for security
  2. Export passwords - Import them into a secure alternative
  3. Delete them from Edge - Don't leave them in a vulnerable state
  4. Change critical passwords - Update passwords for email, banking, finance, admin accounts, and work accounts. Make them unique.
  5. Enable 2FA or passkeys - Add an extra layer of protection where available

If it's an IT team:

  • Disable browser password storage across the organization
  • Switch to a centralized business password manager
  • Consider this when evaluating browser policies

Happy World Password Day. May your credentials be both encrypted until needed, and treated with the security they deserve.

Read our full piece on this: https://proton.me/business/blog/microsoft-edge-passwords-exposed

u/Proton_Team — 15 days ago

Hey everyone,

We’re looking for help from the community to test a new experimental feature: Proton Protocols.

This is our new WireGuard implementation, built with privacy, security, and reliability from the start. It’s currently available as a toggle to a small percentage of beta users on Android, and we’re expanding access to more testers starting now.

Starting Wednesday the 6th of May, all users on Proton VPN Android version 5.18.1.0 or above will be able to enable Proton Protocols.

How you can help us

We want you to use Proton Protocols in your day-to-day browsing, streaming, and general usage, then report anything that feels off. Connection drops, slower speeds, unexpected behavior on specific networks, issues with certain apps. All of it is useful.

The goal is to stress-test this across as many real-world conditions as possible before we roll it out more broadly.

Important: this is experimental

This is not a finished feature. There will be rough edges, and you may run into issues. If something breaks, the best way to report is via the app's bug report feature. It includes logs that are essential for us to debug. Please also include as many details as you are comfortable with, so we can ensure your use case is working well once we launch it.

We’ll share more when this is ready for a wider release, but this new implementation lays the groundwork for improved censorship resistance, smoother reconnections, better stability, and stronger security.

For now, we’re focused on getting it right, and your testing is what makes that possible.

Thank you as always for helping us build a better VPN.

Stay safe,
Proton Team

reddit.com
u/Proton_Team — 17 days ago

UPDATE: We are aware of reports of Proton Drive for Windows users experiencing sync issues after enabling post-quantum encryption. We've temporarily disabled the opt-in to this feature and a fix is in progress. We will provide an update as soon as possible. Thank you for your patience!

Hi everyone,

We’ve just added support for post-quantum encryption in Proton Mail.

Quantum computers aren’t yet capable of breaking today’s encryption, but the risk isn’t theoretical. One reason is “harvest now, decrypt later”, where encrypted data can be collected today and stored until it becomes easier to break in the future.

With this update, you can now enable post-quantum-ready keys for new encrypted emails. This is optional and available on all plans, including free.

A few things to keep in mind:

- Right now, it applies to new encrypted emails going forward (it doesn’t re-encrypt old messages)

- Old message are not yet re-encrypted but will be in a later migration

- Key management works the same way as before

You can learn more here: https://proton.me/blog/introducing-post-quantum-encryption

And see how to enable it here: https://proton.me/support/mail-post-quantum-protection

We’re also starting the transition toward OpenPGP v6 to support newer cryptographic standards.

This is something many of you have been asking about as post-quantum cryptography becomes more relevant.

Let us know what you think in the comments below, and keep the feedback coming. 

u/Proton_Team — 17 days ago
▲ 344 r/lumo+3 crossposts

Dear Proton supporters,

Our annual survey is back and, if you answer it, then your input will directly inform our plans for the year ahead.

We want to know:

- How your experience with Proton has been

- What features and improvements matter most to you

Like last time, we've also included a few questions to help us learn about the people who make up our community. Skip anything you're not comfortable sharing. Whatever you tell us stays aggregated and anonymous.

Because we don't track our users, surveys like this one are the only way we can learn about the people we're building for. Your answers help us make sure our products actually meet the needs of our community, not just who we imagine our community to be.

The survey is anonymous and takes about 5 minutes to complete. Submissions are first come, first served, so once we reach our limit, the survey closes automatically.

Thank you for being part of this. A better internet doesn't build itself.

Survey: https://form.typeform.com/to/X98zpbtI 

Stay secure,
The Proton Team

u/Proton_Team — 20 days ago
▲ 226 r/lumo+1 crossposts

Hey everyone,

Two of the most aggressively monetized data categories in consumer tech are weather and finance.

Free weather apps have been caught for years selling user location data to advertisers and brokers, effectively turning your forecast checks into a location history. Finance apps log every ticker you check, which is a near-perfect signal of what you're researching, holding, or about to trade on.

Most AI assistants treat those queries the same way: logged by default, often fed back into training data.

We've just added weather and finance widgets to Lumo, surfaced directly inside your chat, and we wanted to make sure these features didn't carry the same baggage.

What's new:

  • Weather widget: current conditions and forecasts for any location
  • Finance widget: stocks, currency pairs, and indices

As always, your prompts aren't logged, used to train any model, or shared with third parties, and your chats are stored with zero-access encryption. That means Lumo isn't building a behavioral profile based on where you're going this weekend or what's on your watchlist.

As always, your feedback shapes what we build next. Let us know what you'd like to see.

Stay safe,
Proton Team

u/Proton_Team — 21 days ago

In our newest video, we break down Jeffrey Epstein’s spy network. The surveillance companies he funded. How he used surveillance to affect geopolitics. How those on Epstein island were trapped by a secret spying camera network.

Finally, we ask: how did Epstein benefit?

u/Proton_Team — 22 days ago