ProtonMail is updated adding support for Touch ID

protonMail

A couple of months ago, the company Proton Technologies launched the ProtonMail application that allows us to use the secure and encrypted mail service that until now it only offered us through its website. From this application we can send emails safely, encrypting all the information so that along the way they cannot be intercepted and decrypted by any other person or service.

But we can also set a deadline to read the emails we send. Once that date arrives, whether or not the emails have been read these will be deleted automatically. But we can also protect the emails we send with a password, so that only the recipient of the email can use it to read the emails we send them.

The application arrived on the market with a large number of new features to allow all users of the web service, and the new clients that have arrived after the launch of this version for iOS and Android, keep all your conversations via email protected, but it lacked some options that some users considered fundamental, such as the protection of the application with the Touch ID fingerprint sensor or that the emails that contain attached images will be loaded automatically so that the service does not seem to send telegrams instead of emails.

What's new in version 1.2.3 of ProtonMail

  • Touch ID support
  • Automatic blocking of the application when we are not using it for a while.
  • The emails we receive load the images automatically.
  • Users with a paid Plus account can edit and add customizable signatures.
  • New users can verify their identity through an SMS sent by the service.
  • New support for attaching goats from iCloud, Dropbox, Google Drive ...

How to rename apps on iOS and iPadOS
You are interested in:
How to rename iPhone apps
Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.