Even more secure, Proton Mail now tracks stolen data on the Dark Web


Chloe Claessens

April 22, 2024 at 12:01 p.m.

0

Proton Launches Dark Web Login Leak Monitoring Tool © Proton AG

Proton Launches Dark Web Login Leak Monitoring Tool © Proton AG

Subscribers to Proton will now be notified if their credentials are leaked on the Dark Web. A new feature that enriches an arsenal of features dedicated to strengthening online security, a major area of ​​development for the Swiss company.

This online data leak monitoring option is available to all Internet users who have subscribed to a paid subscription to Proton. As the number of cyberattacks increases, Proton Mail users will now be able to quickly find out if their email address and password have been compromised by breaches affecting third-party services associated with their Proton credentials.

Objective: track Proton identifier leaks in real time

In detail, this new data leak analysis tool detects the theft and resale of Proton identifiers on the Dark Web. To guarantee the effectiveness and responsiveness of its monitoring module, the company announces that it takes advantage of its own data and threat detection technologies, but also uses the knowledge base of Constella Intelligence, a company specializing in analysis. risks linked to digital identity, the mode of operation of which is based on artificial intelligence.

In the event of a proven compromise, Proton will notify its subscribers through the security center recently integrated into the online management interface and Proton Mail applications (desktop and mobile). These alerts will detail the third-party services and accounts affected by data leaks on the Dark Web, and will provide additional information and advice to take immediate security measures and/or mitigate the consequences of the theft of Proton credentials (wrong address). and passwords). Ultimately, other in-app and email notification systems should allow Internet users to become aware of these leaks in real time, and therefore to react instantly.

Monitoring option will detail services affected by Proton credential leaks on the Dark Web © Proton AG

Monitoring option will detail services affected by Proton credential leaks on the Dark Web © Proton AG

Intensive security-oriented development

With its module for monitoring data leaks on the Dark Web, Proton continues its intensive development oriented towards security of privacy and anonymity. In addition to deploying an ecosystem of applications that are end-to-end encrypted by default, the company regularly unveils new features dedicated to strengthening the personal information and digital identity of its subscribers. In the summer of 2023, the Sentinel program combined artificial intelligence and human expertise to report any suspicious connection attempts to so-called risky Proton accounts, while Proton Mail finally embarked on an email alias generator in early 2024.

Finally, we remind you that Proton is one of the most effective email services in terms of inter-supplier confidentiality. Automatic email encryption with PGP-enabled third-party email and support for password encryption for conversations between Proton and providers not compatible with end-to-end encryption ensures its subscribers that all their emails will remain private, whatever the exchange configurations.

Proton Mail Free

See the offer

Read the review


9.1

Proton Mail Free

  • Robust and secure infrastructure
  • Extreme simplification of encryption
  • Located in Switzerland

Proton Mail is a serious alternative to Gmail. It redefines encryption by making it accessible to everyone. Of course, you will probably have to adopt the paid plan to get the most out of it, but it is an excellent first choice for anyone who wants to start freeing themselves from GAFAM services while being assured that communications remain private.

Proton Mail is a serious alternative to Gmail. It redefines encryption by making it accessible to everyone. Of course, you will probably have to adopt the paid plan to get the most out of it, but it is an excellent first choice for anyone who wants to start freeing themselves from GAFAM services while being assured that communications remain private.

Source : Proton AG

Chloe Claessens

Chloe Claessens

I dismantle, I reassemble, I repair, I tinker, I experiment, I divert, I shape, I start again. Determined, nothing electrifies me more than spending hours trying to understand the why...

Read other articles

I dismantle, I reassemble, I repair, I tinker, I experiment, I divert, I shape, I start again. Determined, nothing electrifies me more than spending hours trying to understand the why and the how, until it works. If I'm not behind my screen testing software or writing about Silicon Valley, you'll find me in the vegetable garden configuring a connected irrigation circuit, powered by solar energy.

Read other articles





Source link -99