Let’s Encrypt started with a mission to get the Web to 100% encryption – we want everyone to be able to experience a more secure and privacy-respecting Web. Encryption also helps site operators to have assurance that their content is being delivered as intended. We’ve made great progress toward that goal and are committed to continuing to expand the use of secure communication via encryption.
At Proton we offer end-to-end encrypted products including email, calendar and VPNs. We believe people should have the right to decide for themselves who can access their personal data and that the best way for a company to protect user data is by not having it in the first place. Using end-to-end encryption as standard is the best way to make this happen and we are proud to offer these services. Put simply, at Proton we believe in your right to privacy.
A person’s emails and calendar contain private, personal information that offers an unparalleled insight into their life. Letters to friends and colleagues, shopping receipts, events, flight confirmations: they create a highly personal stream of data. Over the years this data builds up and can be used to construct an in depth profile of a person. Most people think of their inbox and calendar as private, but since most major providers do not use encryption as standard this simply isn’t the case. Proton is working to create an internet that has privacy as the default setting by building a suite of encrypted services giving users control over who has access to their personal data.
Our intent, when creating ProtonMail, was not only to improve online privacy, but to also protect at risk groups such as democracy activists, campaigners, and journalists. Today ProtonMail is the world’s largest secure email service, and our technology protects more than 50 million registered users around the world. We are thankful that so many people are signing up to encrypted services, together we can make the privacy revolution happen.
People should be able to have access to a digital venue that they know that is provably private. We are proud to provide that venue with the @platform, an open source project that allows people, entities and things to converse using end to end encryption. The @platform SDK allows developers to rapidly create privacy preserving end to end encrypted applications. We are also proud of all the developers using the @platform SDK to create amazing applications that create altogether new experiences, because of that privacy!
Security and privacy are vitally important to Zoom users. Both free and paid users can opt to host end-to-end encrypted meetings within their accounts. Zoom E2EE meetings can accommodate up to 1,000 people! As a global leader for secure communications, we look forward to expanding our support for E2EE to Zoom Phone in the future.
In 2013, Mega pioneered user-controlled end-to-end encryption through the web browser. Today, it provides the same zero-knowledge privacy and security for its cloud storage and chat applications, whether through a web browser, mobile app, desktop app or command line tool. Mega The Privacy Company provides Privacy by Design based on the uncompromising use of zero-knowledge user-controlled end-to-end encryption. All chat messages and files are fully encrypted on the user’s device before being sent to Mega, using random keys that are encrypted with the user’s password before the chats and files get stored on Mega. The password remains on the user’s device and is never sent to Mega, so chats and file contents can’t be read or accessed in any manner by Mega. Files can only be decrypted by the original uploader through a logged-in account or by other parties to whom the account holder has consciously provided the required file/folder keys. The privacy provided by Mega is a valued service, necessary for personal, professional, business and government use. It is consistent with the Universal Declaration of Human Rights, Article 12: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence […]. Everyone has the right to the protection of the law against such interference […].
Our end-to-end encrypted cloud collaboration service helps thousands of teams protect the privacy of their most valuable data. Organizations of all shapes and sizes, from NGOs to education and research institutes, small-and medium sized businesses and larger corporations, rely on Tresorit’s end-to-end encrypted service to make sure that their files are only readable to them and no third parties. Any attempts to weaken encryption would undermine the security of all these organizations who are simply doing their day-to-day work and want to guarantee the best-in-class security and privacy for their data.
Tutanota is the secure email service that automatically protects all data with end-to-end encryption. In today’s internet, encryption is the best tool we have to protect our sensitive data from prying eyes. To fight for our right to privacy – to protect journalists, whistleblowers, human rights activists as well as all citizens around the world – this has been our mission since we have started building the encrypted email service Tutanota.”
At the Tor Project, a 501(c)(3) nonprofit, we build free and open source anonymity and privacy technologies to advance human rights and freedoms. Tor Browser relies on end-to-end encryption to provide users protection against tracking, surveillance, and censorship. We’re proud to help millions of people take back their right to privacy, to freely access and share information, and to more easily circumvent internet censorship. Without end-to-end encryption, millions of people would lose their access to the safe and uncensored internet.