Proton Mail brings quantum-safe email encryption to all accounts
Overview
Proton Mail has rolled out an optional feature called post-quantum protection for all users, including those on the free plan. This new capability generates encryption keys that aim to secure future emails from potential quantum computer attacks. To use this feature, users must update their Proton Mail apps, as older versions do not support the new encryption keys. This move is significant because it prepares users' email communications for a future where quantum computing could compromise traditional encryption methods. By enabling post-quantum protection, users can enhance the security of their encrypted emails against evolving threats.
Key Takeaways
- Affected Systems: Proton Mail accounts across all plans
- Action Required: Users need to update to the latest version of Proton Mail apps to enable post-quantum protection.
- Timeline: Newly disclosed
Original Article Summary
Post-quantum protection is now available as an optional feature in Proton Mail across all plans, including the free tier. How post-quantum protection works Once enabled, Proton Mail generates new encryption keys designed to protect future encrypted emails against attacks from quantum computers. Because the feature relies on new encryption keys, users need updated Proton apps that support post-quantum protection. Older app versions do not support the new keys. “Enabling PQC helps protect new encrypted emails … More → The post Proton Mail brings quantum-safe email encryption to all accounts appeared first on Help Net Security.
Impact
Proton Mail accounts across all plans
Exploitation Status
No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.
Timeline
Newly disclosed
Remediation
Users need to update to the latest version of Proton Mail apps to enable post-quantum protection.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Update.