Inside Proton’s Vault: Uncovering Android Proton Drive Artifacts
Proton Drive is Proton’s answer to secure, privacy-first cloud storage, and its Android app extends that same protection to mobile users. Proton is well known for its encrypted ecosystem: Proton Mail delivers end-to-end encrypted email, while Proton VPN provides anonymous, protected internet access. Proton Drive fits seamlessly into this suite of privacy-focused services, enabling users to upload, sync, and share files with all data being encrypted both in transit and at rest, ensuring that sensitive information remains under the user’s control.db-drive location: data\data\me.proton.android.drive\databases\
- UserID - The ID for the User Account
- Email - The email associated with the proton account
- Name - The proton account username
- createdAtUTC - Unix Milliseconds Timestamp when the Account was created
- usedspace - Drive space used in bytes
- maxspace - Max drive space in bytes
Download Link: Android-ProtonDrive-UserAccountInfo.sql
The User account information can also be found in the Account Entity table. This has the userId, username and email just like the UserEntity table, but it also contains Session information:
- State - The state of the application
- SessionState - Whether the session is successfully authenticated
- id - The ID for file/folder
- share_id - Id for the share a file or folder belongs to
- user_id - The Proton account ID that owns the share the file or folder belongs to
- parent_id - id for the folder that the current file or folder resides in
- Type - Indicates the type of item
- Type 1 = Folder
- Type 2 = File
- Name - The name of the file or folder. The value in this field is stored as a PGP-Encrypted message vs being in plain text
- State - Indicates the state of the item. I have only observed 2 values here
- State 1 = Active
- State 2 = Trashed
- Size - The size of the file in bytes. For folders this value will be 0
- Mime_Type - The mime type of the item. This will give you an indication of the type of file.
- creation_time - Unix timestamp for when the file/folder was originally created in Proton Drive.
- last_modified - Unix timestamp for when the file/folder was last modified in Proton Drive.
- trashed_time - Unix timestamp for when the file/folder was moved to the Trash in Proton Drive.
- is_shared - Indicates whether the file or folder is being shared with other users
- 0 - The item is not shared
- 1 - The item is being shared with other users
- number_of_accesses - Records how many times a file/folder has been accessed within Proton Drive.
Query Results Part 1:

Whilst we can get some file metadata, we do not get the names of the files/folders as they are stored inside a PGP Encrypted Message in the Name field.
Whilst we can identify the account information and the ids of owners involved in shared files and folders, the privacy-centric design of Proton Drive means we can recover only limited high-level metadata about the items themselves. Anytime we face PGP encryption, the nature of the examination changes because critical components such as file contents, emails, and filenames (as seen in this example), become inaccessible without the associated private key to decrypt the contents, which is often protected by a password.
However, even with the encrypted fields in the LinkEntity table, we can still obtain valuable forensic insights. Timestamps, structural hierarchy, share indicators, access counts, and cryptographic metadata can all be used to reconstruct user activity, understand folder relationships, and assess what was stored, even if the plaintext filenames remain protected.

Comments
Post a Comment