Proton

Now that the Proton Mail Campaign(new window) has raised over $250,000 for protecting online privacy, some people have asked us, how much do we need to raise to accomplish our stretch goals?

In the table below, we have outlined our goals, and the amount of money that would be necessary to turn these goals into reality.

20140626125233-igg-stretch-goals(new window)

We hope to get enough funding to at least build out the Android and iOS versions of Proton Mail. This would require us to raise double our current funding of $250,000. The money would go towards the additional servers we need to support the load from app users, and hiring additional developers to join our team to speed up development of the apps. We intend to build these features even if the funding targets are not met, but with more funding, we’ll be able to build in all these features faster and help everyone better protect their privacy.

Ensuring security and privacy for all requires constant innovation as every day, there are powerful organizations working on new ways to deprive us of this fundamental human right. Any additional funding we receive puts us in a much stronger position to meet these challenges.

As history has shown time and time ago, freedom and privacy go hand in hand, as one simply cannot have one without the other. Please share our campaign, and let people know why privacy matters.

http://igg.me/projects/protonmail(new window)

Related articles

An illustration of a laptop and an open envelope
Lay the foundation for lasting business success with a privacy-first website using a secure domain and email from Porkbun and Proton Mail.
Flow, a wordless fable about a cat and other stray animals navigating a flooded world, was made with Blender, a free, open-source 3D animation tool.
A Latvian indie film that used open source tools beat Disney at the Oscars, proving open source can challenge industry giants.
A Bitcoin and a central bank digital currency coin
Learn how CBDCs could give governments new powers to control money and monitor financial activity and how Bitcoin prevents this.
A computer monitor, a box of case files, and a lock representing law firms that protect their information security
A simple guide to law firm cybersecurity. See how to protect business and client data, prevent breaches, and stay compliant with encryption.
The cover image for a Proton Pass blog about brushing scams, which shows a package with a warning sign above it
A brushing scam means your personal data has leaked online. Learn how to protect yourself with hide-my-email aliases and dark web monitoring.
An encryption lock breaking
Apple turned off its end-to-end encryption in the UK in response to a government notice. We look at what this means and how people in the UK can protect their data.