North Shore Computer Services

Protect Your Email Communications With Protonmail

End-to-End Encryption - Messages are stored on ProtonMail servers in encrypted format. They are also transmitted in encrypted format between our servers and user devices. Messages between ProtonMail users are also transmitted in encrypted form within our secure server network. Because data is encrypted at all steps, the risk of message interception is largely eliminated.

Zero Access to User Data - ProtonMail's zero access architecture means that your data is encrypted in a way that makes it inaccessible to us. Data is encrypted on the client side using an encryption key that we do not have access to. This means we don't have the technical ability to decrypt your messages, and as a result, we are unable to hand your data over to third parties. With ProtonMail, privacy isn't just a promise, it is mathematically ensured. For this reason, we are also unable to do data recovery. If you forget your password, we cannot recover your data.

Open Source Cryptography - We use only secure implementations of AES, RSA, along with OpenPGP. Furthermore, all of the cryptographic libraries we use are open source. By using open source libraries, we can guarantee that the encryption algorithms we are using do not have clandestinely built in back doors. ProtonMail's open source software has been thoroughly vetted by security experts from around the world to ensure the highest levels of protection.

We will work with you to help you transition from Gmail, Yahoo, AOL, Hotmail, and other email providers that do not respect private communications.

  • Teen boy taking notes with headphones on

    Make remote learning as pleasant as possible

  • Lady on laptop

    Be prepared to be able to work from anywhere

  • Remote worker smiling

    Your home office should be enjoyable

  • Man reviewing work on laptop screen

    Access your files securely from anywhere

  • Keyboard with a stethoscope

    Preventative & Computer Repair Services To Keep Your Computers Operating Optimally

  • Secure Image of a Binary House

    Browse the Internet Privately and Securely

  • Picture of a row of data center racks

    Safely & Securely Store Your Sensitive Data In The Cloud

  • Box of old photographs

    Let us scan your photos so you can enjoy them on your computer or TV

  • Old Dusty Hard Drive

    We Can Recover Data From Your Old Hard Drives!

  • multiple hard drives

    Have A Restorable Backup Of Your Critical Data