Proton AG programming language
Proton AG's high-level, scripting-based, cross-platform, multi-paradigm, compiled, general-purpose, structured, imperative, procedural, object-oriented, functional, statically and strongly typed, generic, logic-based, and open-source programming language, with auditable transparency, would be one of the most important software options for Windows, Linux, and macOS for software engineers and developers to use in creating, developing, and enhancing websites, web applications, mobile applications, software, and much more, focusing on privacy and end-to-end encryption with zero access, as an alternative to Python, Java, and other languages.
The programming language is called ProtonScript or ProtonLang and is available for Windows, Linux, and macOS. Among its features and characteristics, it stands out for its end-to-end encryption of all code, variables, writes, and operations, with zero access. For example: integrated encryption (encrypt(), decrypt()) with state-of-the-art algorithms (AES-256, Curve25519, XChaCha20), secret token = "super-private-key".
More examples:
📁 secure_notes.plg
Complete application: private notes, zero leakage
1️⃣ Ethical manifest (mandatory)
manifest {
name "Secure Notes"
version "1.0.0"
purpose "Create and store encrypted private notes"
data_owner "User"
telemetry false
guarantees {
noplaintextstorage
nounencryptednetwork
nothirdparty_access
}
}
➡️ No manifest = does not compile
➡️ The final binary loads this user-readable block
2️⃣ Encrypted source code at rest
source {
encryption "E2EE"
key_scope "LocalDeveloperKey"
}
🔐 The file never exists in plain text on disk
🔐 It is only decrypted in memory, temporarily
3️⃣ Secure imports (only (Audited APIs)
use crypto::core
use crypto::keys
use crypto::sealed_data
use storage::sealedstore
use runtime::secureenv
use runtime::permissions
❌ No insecure imports
❌ Nothing legacy, nothing optional
4️⃣ Isolated execution environment
environment secure {
memory {
encrypted true
zeroizeonexit true
}
network {
default deny
}
storage {
default sealed
metadata minimal
}
logging {
sensitive_data forbidden
}
🛡️ Natural state = total isolation
5️⃣ Definition of secure types
type NoteID = Safe<String>
type Note = Encrypted<String>
Safe<T> → validated, not executable
Encrypted<T> → never exists in plain text Pure
6️⃣ Key Initialization (Automatic and Secure)
let master_key: Secret<Key> = Key.generate {
algorithm auto
rotation every 10 minutes
exportable false
}
✔ Always strong algorithm
✔ Key never leaves the process
✔ Automatic rotation
7️⃣ Note Creation (Always Encrypted)
fn create_note(id: NoteID, content: Safe<String>) -> Note {
let encrypted_note: Note =
encrypt(content, using: master_key)
return encrypted_note
}
📌 content:
Never logable
Never serializable
Never transmitted without permission
8️⃣ Sealed Storage
fn save_note(id: NoteID, note: Note) {
sealed_store.save {
key id
value note
integrity true
metadata hidden
}
}
📦 Result:
Encrypted data
Minimal metadata
No revealing timestamps
9️⃣ Secure read
fn load_note(id: NoteID) -> Note {
let note: Note =
sealed_store.load(id)
return note
}
🔐 Remains encrypted
🔐 Can only be used in authorized context
🔟 Forbidden attempts (blocked at compilation)
print(note)
❌ Error:
SecurityViolation: Encrypted data cannot be printed or logged.
send(note)
❌ Error:
PermissionDenied: Network access not declared.
1️⃣1️⃣ Explicit network permission (encrypted backup)
allow network to "backup.proton.local" {
purpose "Encrypted user backup"
send only Encrypted
}
📄 Visible to the end user:
“This app sends only encrypted data to backup.proton.local”
1️⃣2️⃣ Main execution
fn main() {
let id: NoteID = Safe("note_001")
let content: Safe<String> =
Safe("My extremely private note")
let note: Note =
create_note(id, content)
save_note(id, note)
}
✔ No line creates persistent plain text
✔ No line allows leakage
1️⃣3️⃣ Secure shutdown
on exit {
zeroize(master_key)
wipe {
memory
temp_buffers
}
}
-
Volb3s
commented
Language is privacy and digital freedom.