> Still I normally end up using the web interface for ProtonMail as it fits my workflow better and only need to have one tab open in my browser. They even have a nicer looking beta which also has an in-built dark theme at https://beta.protonmail.com
Btw, you can have both static beta web client and offline access to the email messages using https://github.com/vladimiry/ElectronMail even being on free account as opposed to Bridge thing. The app also supports "persistent sessions" feature, unlimited full-text search (body content also gets scnned) and other fancy stuff.
> If you access ProtonMail via their web app, all that's needed to steal your password and decrypt email at will is a few quick changes to the index.html they serve you. This could be targeted to specific users, and once the password is exfiltrated, the page can be reloaded, leaving no trace of the attack. Anyone with access to ProtonMail's back end code or infrastructure could do this. So at least in the case of their web app, they could absolutely provide LE with whatever they wanted in a way that would be quite difficult for the average user to detect.
https://www.duplicati.com does that for free being open-source thing, all platforms supported.