When comparing VeraCrypt vs ProtonMail, the Slant community recommends VeraCrypt for most people. In the question“What are the best tools/apps/extensions to help keep my data private?” VeraCrypt is ranked 2nd while ProtonMail is ranked 15th. The most important reason people chose VeraCrypt is:
Veracrypt is an on-the-fly encryption tool. Meaning that it decrypts files only when they are needed and that the files are otherwise kept encrypted the rest of the time.
Specs
Ranked in these QuestionsQuestion Ranking
Pros
Pro On-the-fly encryption
Veracrypt is an on-the-fly encryption tool. Meaning that it decrypts files only when they are needed and that the files are otherwise kept encrypted the rest of the time.
Pro Free
This project is free and users are encouraged to donate something to keep the project going.
Pro Several encryption cyphers supported
Supports AES, TwoFish and Serpent encryption cyphers.
Pro Open source code
The source code is open to review. It has already had a security audit and it did well, with small problems fixed by authors within days of being reported. Its predecessor source, Truecrypt, had a detailed audit that found its capabilities sound, completed (ironically) shortly before the TC folks decided to call it quits. Anyone skeptical or curious about what it does can see how it works, at the gut level.
Pro Support for AES code in CPU
Most Intel and AMD (and possibly other) CPUs have AES specific instruction sets, so you needn't task the CPU during the en/de/crypt process when using AES, VC throughput is as if the code were in 'firmware'; you can see the effect if you choose anything but AES as your cipher.
Pro Can create containers
It can create containers (like a encrypted folder) which is very useful.
Pro Regular updates
Veracrypt is in active development with constant and regular updates and several external audits in the planning stages.
Pro Multiplatform
Veracrypt is supported on MacOS, Linux and Windows.
Pro Built on top of TrueCrypt
Pro Easy to use
It's easy to understand and use.
Pro Built-in end-to-end encryption
Pro No personal information needed
To create an account you don't need to give any personal information, just choose username, domain, and password. Even the recovery email address is optional.
Pro Privacy respecting
User data is protected by strict privacy laws because all servers are located in Switzerland.
Pro Open Source
Pro Mobile apps
Apps for Android and iOS available.
Cons
Con Can't create volumes on the Mac.
The password used to create the volume doesn't open the volume one minute later. VeraCrypt 1.21/FUSE 3.82/macOS 10.12.6. Recreated on 3 Macs now. Unusable.
Con Not plug and play
Requires some tech savvy, so some skill is required, particularly if things go wrong. In the Windows world different UEFI implementations can cause problems in one, not in others, and the solutions are not uniform between issues. For Bitlocker, Microsoft worked out issues with vendors before hand, so if Windows installs and works without bitlocker, it will likely work with it.
Con The UI is not compliant with the Mac
This program does not use Mac UI standards. Nevertheless, it is acceptable.
Con Javascript-intensive Webmail
Free accounts are required to use Javascript webmail and encryption is done in the browser. Javascript cryptography is harmful for security and should not be used.
Con Encryption Keys are stored server-side
The keys are generated during account creation. Using your existing keys is prohibited and ProtonMail must store and control the private keys. Encryption cannot be secure unless the user controls the private keys.
Con Still lacks some useful features
At the moment, there is no calendar feature and contact management is quite poor. They will, however, start to work on it.
Con Ties to US Investors
ProtonMail takes money from US Investors
Con No IMAP and SMTP support for basic accounts
Basic accounts are restricted to the Protonmail web client. Support for IMAP and SMTP is available with a paid subscription only, and as such with basic accounts it is not possible to send and receive email with external applications.
Con Overly expensive for desktop support
Con Requires phone number for login
If you sign up over Tor or a VPN, it will require email or phone number verification. Email verification is disabled if you use an email that isn't from Google or Outlook.