1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-07-30 20:41:04 +00:00
Files
i18n/i18n/pl/email.md
2025-07-10 13:42:45 +00:00

28 KiB

meta_title, title, icon, description, cover, global
meta_title title icon description cover global
Zalecenia dotyczące szyfrowanej, prywatnej poczty e-mail - Privacy Guides Usługi poczty elektronicznej material/email Ci dostawcy poczty e-mail oferują świetne miejsce do bezpiecznego przechowywania wiadomości e-mail, a wielu z nich oferuje interoperacyjne szyfrowanie OpenPGP z innymi dostawcami. email.webp
randomize-element
table tbody

Chroni przed następującymi zagrożeniami:

Poczta e-mail jest praktycznie niezbędna do korzystania z dowolnej usługi online, jednak nie zalecamy jej do rozmów osobistych. Zamiast korzystać z poczty e-mail do kontaktowania się z innymi osobami, warto rozważyć użycie komunikatora internetowego, który obsługuje przekazywanie poufnych informacji.

Zalecane komunikatory internetowe{.md-button}

Rekomendowani dostawcy

W pozostałych przypadkach polecamy różnych dostawców poczty e-mail w oparciu o zrównoważone modele biznesowe oraz wbudowane funkcje bezpieczeństwa i prywatności. Przeczytaj naszą pełną listę kryteriów, aby uzyskać więcej informacji.

Dostawca OpenPGP / WKD IMAP /SMTP Szyfrowanie po stronie klienta Anonimowe metody płatności
Proton Mail :material-check:{ .pg-green } :material-information-outline:{ .pg-blue } Tylko płatne plany :material-check:{ .pg-green } Gotówka
Mailbox.org :material-check:{ .pg-green } :material-check:{ .pg-green } :material-information-outline:{ .pg-blue } Tylko poczta Gotówka
Tuta :material-alert-outline:{ .pg-orange } :material-alert-outline:{ .pg-orange } :material-check:{ .pg-green } Monero
Gotówka za pośrednictwem strony trzeciej

Oprócz (lub zamiast) zalecanego tutaj dostawcy poczty e-mail, możesz rozważyć dedykowaną usługę aliasingu poczty e-mail, aby chronić swoją prywatność. Usługi te mogą między innymi pomóc chronić twoją prawdziwą skrzynkę odbiorczą przed spamem, uniemożliwić marketingowcom korelację twoich kont i zaszyfrować wszystkie wiadomości przychodzące przy użyciu PGP.

Usługi kompatybilne z OpenPGP

Dostawcy ci natywnie obsługują szyfrowanie/deszyfrowanie OpenPGP i standard Web Key Directory (WKD), umożliwiając niezależne od dostawcy kompleksowe szyfrowanie wiadomości e-mail. Na przykład, użytkownik Proton Mail może wysłać wiadomość E2EE do użytkownika Mailbox.org lub możesz otrzymywać zaszyfrowane powiadomienia OpenPGP z usług internetowych, które je obsługują.

Ostrzeżenie

Podczas korzystania z technologii E2EE, takiej jak OpenPGP, wiadomość e-mail nadal będzie zawierać pewne metadane, które nie są zaszyfrowane w nagłówku wiadomości e-mail, w tym zazwyczaj wiersz tematu! Dowiedz się więcej o metadanych e-maili.

OpenPGP nie obsługuje również funkcji forward secrecy, co oznacza, że jeśli klucz prywatny użytkownika lub odbiorcy wiadomości zostanie kiedykolwiek skradziony, wszystkie poprzednie wiadomości zaszyfrowane za jego pomocą zostaną ujawnione.

Proton Mail

Logo Proton Mail{ align=right }

Proton Mail to usługa poczty elektronicznej skupiająca się na prywatności, szyfrowaniu, bezpieczeństwie i łatwości użytkowania. Działają od 2013 roku. Proton AG ma siedzibę w Genewie, w Szwajcarii.

Plan Proton Free obejmuje 500 MB pamięci pocztowej, którą możesz bezpłatnie zwiększyć do 1 GB.

:octicons-home-16: Strona główna{ .md-button .md-button--primary } :simple-torbrowser:{ .card-link title="Usługa Onion" } :octicons-eye-16:{ .card-link title="Polityka prywatności" } :octicons-info-16:{ .card-link title="Dokumentacja" } :octicons-code-16:{ .card-link title="Kod źródłowy" }

Pliki do pobrania

Free accounts have some limitations, such as not being able to search body text and not having access to Proton Mail Bridge, which is required to use a recommended desktop email client (e.g., Thunderbird). Paid accounts include features like Proton Mail Bridge, additional storage, and custom domain support. If you have the Proton Unlimited plan or any multi-user Proton plan, you also get SimpleLogin Premium for free.

A letter of attestation was provided for Proton Mail's apps on 9th November 2021 by Securitum.

Proton Mail has internal crash reports that are not shared with third parties. This can be disabled in the web app: ⚙️All SettingsAccountSecurity and privacyPrivacy and data collection.

:material-check:{ .pg-green } Custom Domains and Aliases

Paid Proton Mail subscribers can use their own domain with the service or a catch-all address. Proton Mail also supports sub-addressing, which is useful for people who don't want to purchase a domain.

:material-check:{ .pg-green } Private Payment Methods

Proton Mail accepts cash by mail in addition to standard credit/debit card, Bitcoin, and PayPal payments.

:material-check:{ .pg-green } Account Security

Proton Mail supports TOTP two-factor authentication and hardware security keys using FIDO2 or U2F standards. The use of a hardware security key requires setting up TOTP two-factor authentication first.

:material-check:{ .pg-green } Data Security

Proton Mail has zero-access encryption at rest for your emails and calendars. Data secured with zero-access encryption is only accessible by you.

Certain information stored in Proton Contacts, such as display names and email addresses, are not secured with zero-access encryption. Contact fields that support zero-access encryption, such as phone numbers, are indicated with a padlock icon.

:material-check:{ .pg-green } Email Encryption

Proton Mail has integrated OpenPGP encryption in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. Proton also supports automatic external key discovery with WKD. This means that emails sent to other providers which use WKD will be automatically encrypted with OpenPGP as well, without the need to manually exchange public PGP keys with your contacts. They also allow you to encrypt messages to non-Proton Mail addresses without OpenPGP, without the need for them to sign up for a Proton Mail account.

Proton Mail also publishes the public keys of Proton accounts via HTTP from their WKD. This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Proton's own domains, like @proton.me. If you use a custom domain, you must configure WKD separately.

:material-information-outline:{ .pg-blue } Account Termination

If you have a paid account and your bill is unpaid after 14 days, you won't be able to access your data. After 30 days, your account will become delinquent and won't receive incoming mail. You will continue to be billed during this period. Proton will delete inactive free accounts after one year. You cannot reuse the email address of a deactivated account.

:material-information-outline:{ .pg-blue } Additional Functionality

Proton Mail's Unlimited plan also enables access to other Proton services in addition to providing multiple custom domains, unlimited hide-my-email aliases, and 500 GB of storage.

Mailbox.org

Mailbox.org logo{ align=right }

Mailbox.org is an email service with a focus on being secure, ad-free, and powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany.

Accounts start with up to 2 GB storage, which can be upgraded as needed.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title="Documentation" }

Downloads

:material-check:{ .pg-green } Custom Domains and Aliases

Mailbox.org lets you use your own domain, and they support catch-all addresses. Mailbox.org also supports sub-addressing, which is useful if you don't want to purchase a domain.

:material-check:{ .pg-green } Private Payment Methods

Mailbox.org doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept cash by mail, cash payment to bank account, bank transfer, credit card, PayPal, and a couple of German-specific processors: Paydirekt and Sofortüberweisung.

:material-check:{ .pg-green } Account Security

Mailbox.org supports two-factor authentication for their webmail only. You can use either TOTP or a YubiKey via the YubiCloud. Web standards such as WebAuthn are not yet supported.

:material-information-outline:{ .pg-blue } Data Security

Mailbox.org allows for encryption of incoming mail using their encrypted mailbox. New messages that you receive will then be immediately encrypted with your public key.

However, Open-Xchange, the software platform used by Mailbox.org, does not support the encryption of your address book and calendar. A standalone option may be more appropriate for that data.

:material-check:{ .pg-green } Email Encryption

Mailbox.org has integrated encryption in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow remote recipients to decrypt an email on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.

Mailbox.org also supports the discovery of public keys via HTTP from their WKD. This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must configure WKD separately.

:material-information-outline:{ .pg-blue } Account Termination

Your account will be set to a restricted user account when your contract ends. It will be irrevocably deleted after 30 days.

:material-information-outline:{ .pg-blue } Additional Functionality

You can access your Mailbox.org account via IMAP/SMTP using their .onion service. However, their webmail interface cannot be accessed via their .onion service, and you may experience TLS certificate errors.

All accounts come with limited cloud storage that can be encrypted. Mailbox.org also offers the alias @secure.mailbox.org, which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports Exchange ActiveSync in addition to standard access protocols like IMAP and POP3.

Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs, providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address.

More Providers

These providers store your emails with zero-knowledge encryption, making them great options for keeping your stored emails secure. However, they don't support interoperable encryption standards for E2EE communications between different providers.

  • Tuta logo{ .twemoji loading=lazy }Tuta logo{ .twemoji loading=lazy } Tuta

Tuta

Tuta logo{ align=right } Tuta logo{ align=right }

Tuta (formerly Tutanota) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany.

Free accounts start with 1 GB of storage.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title="Documentation" } :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title="Contribute" }

Downloads

Tuta doesn't support the IMAP protocol or the use of third-party email clients, and you also won't be able to add external email accounts to the Tuta app. Email import is not currently supported either, though this is due to be changed. Emails can be exported individually or by bulk selection per folder, which may be inconvenient if you have many folders.

:material-check:{ .pg-green } Custom Domains and Aliases

Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on custom domains. Tuta doesn't allow for sub-addressing (plus addresses), but you can use a catch-all with a custom domain.

:material-information-outline:{ .pg-blue } Private Payment Methods

Tuta only directly accepts credit cards and PayPal, however cryptocurrency can be used to purchase gift cards via their partnership with ProxyStore.

:material-check:{ .pg-green } Account Security

Tuta supports two-factor authentication with either TOTP or U2F.

:material-check:{ .pg-green } Data Security

Tuta has zero-access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.

:material-information-outline:{ .pg-blue } Email Encryption

Tuta does not use OpenPGP. Tuta accounts can only receive encrypted emails from non-Tuta email accounts when sent via a temporary Tuta mailbox.

:material-information-outline:{ .pg-blue } Account Termination

Tuta will delete inactive free accounts after six months. You can reuse a deactivated free account if you pay.

:material-information-outline:{ .pg-blue } Additional Functionality

Tuta offers the business version of Tuta to non-profit organizations for free or with a heavy discount.

Criteria

Please note we are not affiliated with any of the providers we recommend. In addition to our standard criteria, we have developed a clear set of requirements for any email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing an email provider, and conduct your own research to ensure the email provider you choose is the right choice for you.

Technology

We regard these features as important in order to provide a safe and optimal service. You should consider whether the provider which has the features you require.

Minimum to Qualify:

  • Must encrypt email account data at rest with zero-access encryption.
  • Must be capable of exporting emails as Mbox or individual .EML with RFC5322 standard.
  • Allow users to use their own domain name. Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy.
  • Must operate on owned infrastructure, i.e. not built upon third-party email service providers.

Best Case:

  • Should encrypt all account data (contacts, calendars, etc.) at rest with zero-access encryption.
  • Should provide integrated webmail E2EE/PGP encryption as a convenience.
  • Should support WKD to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key with this command: gpg --locate-key example_user@example.com.
  • Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
  • Should support sub-addressing.
  • Should allow users to use their own domain name. Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy.
  • Catch-all or alias functionality for those who use their own domains.
  • Should use standard email access protocols such as IMAP, SMTP, or JMAP. Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider.
  • Email provider's services should be available via an onion service.

Privacy

We prefer our recommended providers to collect as little data as possible.

Minimum to Qualify:

  • Must protect sender's IP address, which can involve filtering it from showing in the Received header field.
  • Must not require personally identifiable information (PII) besides a username and a password.
  • Privacy policy must meet the requirements defined by the GDPR.

Best Case:

Security

Email servers deal with a lot of very sensitive data. We expect that providers will adopt industry best practices in order to protect their customers.

Minimum to Qualify:

  • Protection of webmail with 2FA, such as TOTP.
  • Zero-access encryption, which builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server.
  • DNSSEC support.
  • No TLS errors or vulnerabilities when being profiled by tools such as Hardenize, testssl.sh, or Qualys SSL Labs; this includes certificate related errors and weak DH parameters, such as those that led to Logjam.
  • A server suite preference (optional on TLS 1.3) for strong cipher suites which support forward secrecy and authenticated encryption.
  • A valid MTA-STS and TLS-RPT policy.
  • Valid DANE records.
  • Valid SPF and DKIM records.
  • Must have a proper DMARC record and policy or use ARC for authentication. If DMARC authentication is being used, the policy must be set to reject or quarantine.
  • A server suite preference of TLS 1.2 or later and a plan for RFC8996.
  • SMTPS submission, assuming SMTP is used.
  • Website security standards such as:
  • Must support viewing of message headers, as it is a crucial forensic feature to determine if an email is a phishing attempt.

Best Case:

Trust

You wouldn't trust your finances to someone with a fake identity, so why trust them with your email? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.

Minimum to Qualify:

  • Public-facing leadership or ownership.

Best Case:

  • Frequent transparency reports.

Marketing

With the email providers we recommend, we like to see responsible marketing.

Minimum to Qualify:

  • Must self-host analytics (no Google Analytics, Adobe Analytics, etc.).
  • Must not have any irresponsible marketing, which can include the following:
    • Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
    • Guarantees of protecting anonymity 100%. When someone makes a claim that something is 100%, it means there is no certainty for failure. We know people can quite easily de-anonymize themselves in a number of ways, e.g.:
      • Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software such as Tor
      • Browser fingerprinting

Best Case:

  • Clear and easy-to-read documentation for tasks like setting up 2FA, email clients, OpenPGP, etc.

Additional Functionality

While not strictly requirements, there are some other convenience or privacy factors we looked into when determining which providers to recommend.