...It makes use of Apple’s networking APIs and encryption frameworks to deliver seamless management of encrypted communications while respecting platform conventions like touch navigation, Apple notifications, and background refresh. All sensitive operations — including key handling and encryption — occur locally on the user’s device, ensuring that plaintext messages and secret keys are never exposed to Proton’s servers or third parties.