Key email providers and rekey VPN

This commit is contained in:
djoate
2019-11-24 15:02:30 -05:00
parent fbb227f67f
commit 70f0db537d
4 changed files with 238 additions and 112 deletions

View File

@ -1,4 +1,10 @@
---
Best_Secure_Email_Providers_for_Privacy_KEY: |
Best Secure Email Providers for Privacy
Find_a_secure_email_provider_that_will_keep_your_privacy_in_mind._Dont_settle_for_adsupported_platf_KEY: |
Find a secure email provider that will keep your privacy in mind. Don't settle for ad-supported platforms. Never trust any company with your privacy, always encrypt.
Web_Hosting_KEY: |
Web Hosting
@ -911,6 +917,156 @@ httpsretroshare.ccdownloads.htmlfreebsd_KEY: |
httpsgithub.comRetroShareRetroShare_KEY: |
https://github.com/RetroShare/RetroShare
PrivacyConscious_Email_Providers__No_Affiliates_KEY: |
Privacy-Conscious Email Providers - No Affiliates
All_providers_listed_here_are_operating_outside_the_US_and_support_a_datatoggletooltip_dataplac_KEY: |
All providers listed here are operating outside the US and support <a data-toggle="tooltip" data-placement="bottom" data-original-title="When sending or receiving emails, if both the sending and receiving servers support TLS encryption, the email is sent between servers using an encrypted connection.">SMTP TLS.</a> The table is sortable.
Email_Provider_KEY: |
Email Provider
Since_KEY: |
Since
Jurisdiction_KEY: |
Jurisdiction
Storage_KEY: |
Storage
Yearly_Price_KEY: |
Yearly Price
Bitcoin_KEY: |
Bitcoin
Encryption_KEY: |
Encryption
Own_Domain_KEY: |
Own Domain
httpsdisroot.org_KEY: |
https://disroot.org
Netherlands_KEY: |
Netherlands
_Free__tl_note_free_as_in_no_money_cost__KEY: |
{{ "Free" | tl_note: free as in no money cost }}
Accepted_KEY: |
Accepted
Builtin_KEY: |
Built-in
Yes_KEY: |
Yes
httpskolabnow.com_KEY: |
https://kolabnow.com
Switzerland_KEY: |
Switzerland
No_KEY: |
No
httpsmailbox.org_KEY: |
https://mailbox.org
Germany_KEY: |
Germany
httpsmailfence.com_KEY: |
https://mailfence.com
Belgium_KEY: |
Belgium
httpswww.neomailbox.com_KEY: |
https://www.neomailbox.com
httpsposteo.de_KEY: |
https://posteo.de
httpsprotonmail.com_KEY: |
https://protonmail.com
Tor_KEY: |
Tor
httpsrunbox.com_KEY: |
https://runbox.com
Norway_KEY: |
Norway
httpssoverin.net_KEY: |
https://soverin.net/
httpswww.startmail.com_KEY: |
https://www.startmail.com
httpswww.tutanota.com_KEY: |
https://www.tutanota.com
Interesting_Email_Providers_Under_Development_KEY: |
Interesting Email Providers Under Development
httpswww.confidantmail.org_KEY: |
https://www.confidantmail.org/
Confidant_Mail_KEY: |
Confidant Mail
An_opensource_nonSMTP_cryptographic_email_system_optimized_for_large_file_attachments._It_is_a_secu_KEY: |
An open-source non-SMTP cryptographic email system optimized for large file attachments. It is a secure and spam-resistant alternative to regular email and online file drop services. It uses <a href="https://theprivacyguide.org/tutorials/gpg.html">GNU Privacy Guard (GPG)</a> for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.
Become_Your_Own_Email_Provider_with_MailinaBox_KEY: |
Become Your Own Email Provider with Mail-in-a-Box
httpsmailinabox.email_KEY: |
https://mailinabox.email/
MailinaBox_KEY: |
Mail-in-a-Box
Take_it_a_step_further_and_get_control_of_your_email_with_this_easytodeploy_mail_server_in_a_box._M_KEY: |
Take it a step further and get control of your email with this easy-to-deploy mail server in a box. Mail-in-a-Box lets you become your own mail service provider in a few easy steps. It's sort of like making your own Gmail, but one you control from top to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you don't need to be a technology expert to set it up.
More_KEY: |
More:
Related_Information_KEY: |
Related Information
httpswww.wired.com201110ecpaturnstwentyfive_KEY: |
https://www.wired.com/2011/10/ecpa-turns-twenty-five/
Aging_Privacy_Law_Leaves_Cloud_EMail_Open_to_Cops_KEY: |
Aging 'Privacy' Law Leaves Cloud E-Mail Open to Cops
Data_stored_in_the_cloud_for_longer_than_6_months_is_considered_abandoned_and_may_be_accessed_by_inte_KEY: |
Data stored in the cloud for longer than 6 months is considered abandoned and may be accessed by intelligence agencies without a warrant. Learning: Use an external email client like Thunderbird or Enigmail, download your emails and store them locally. Never leave them on the server.
httpswww.eff.orgdeeplinks201204mayfirstriseupserverseizurefbioverreachesyetagain_KEY: |
https://www.eff.org/deeplinks/2012/04/may-firstriseup-server-seizure-fbi-overreaches-yet-again
With_May_FirstRiseup_Server_Seizure_FBI_Overreaches_Yet_Again_KEY: |
With May First/Riseup Server Seizure, FBI Overreaches Yet Again
httpswww.autistici.orgaicrackdown_KEY: |
https://www.autistici.org/ai/crackdown/
AutisticiInventati_server_compromised_KEY: |
Autistici/Inventati server compromised
The_cryptographic_services_offered_by_the_AutisticiInventati_server_have_been_compromised_on_15th_Ju_KEY: |
The cryptographic services offered by the Autistici/Inventati server have been compromised on 15th June 2004. It was discovered on 21st June 2005. One year later. During an enquiry on a single mailbox, the Postal Police may have tapped for a whole year every user's private communication going through the server autistici.org/inventati.org.
VeraCrypt__Disk_Encryption_KEY: |
VeraCrypt - Disk Encryption
@ -1520,9 +1676,6 @@ GitHub_KEY: |
This_is_a_community_project_aiming_to_deliver_the_best_information_available_to_improve_privacy_onlin_KEY: |
This is a community project aiming to deliver the best information available to improve privacy online. Thank you for participating. This project needs you.
Tor_KEY: |
Tor
The_Tor_network_is_a_group_of_volunteeroperated_servers_that_allows_people_to_improve_their_privacy__KEY: |
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool.
@ -1733,21 +1886,9 @@ Denmark_KEY: |
France_KEY: |
France
Netherlands_KEY: |
Netherlands
Norway_KEY: |
Norway
Nine_Eyes_KEY: |
Nine Eyes
Belgium_KEY: |
Belgium
Germany_KEY: |
Germany
Italy_KEY: |
Italy
@ -1892,18 +2033,12 @@ proposed_KEY: |
httpswww.wikipedia.orgwikiKey_disclosure_lawSwitzerland_KEY: |
https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland
Switzerland_KEY: |
Switzerland
Key_disclosure_laws_dont_apply_KEY: |
Key disclosure laws don't apply
_people_who_know_how_to_access_a_system_may_be_ordered_to_share_their_knowledge_stronghowever_t_KEY: |
* (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>)
Related_Information_KEY: |
Related Information
httpsen.wikipedia.orgwikiKey_disclosure_law_KEY: |
https://en.wikipedia.org/wiki/Key_disclosure_law
@ -2039,9 +2174,6 @@ Other_Providers_Worth_Mentioning_KEY: |
ProtonVPN_KEY: |
ProtonVPN
_Free__tl_note_Free_as_in_no_monetary_value__KEY: |
{{ "Free" | tl_note: Free as in no monetary value }}
USD_KEY: |
USD
@ -3365,9 +3497,6 @@ Please_note_we_are_not_affiliated_with_any_of_the_providers_we_recommend._This_a
We_have_developed_a_clear_set_of_requirements_for_any_VPN_provider_wishing_to_be_recommended_includi_KEY: |
We have developed a clear set of requirements for any VPN provider wishing to be recommended, including strong encryption, independent security audits, modern technology, and more. We suggest you familiarize yourself with this list before choosing a VPN provider, and conduct your own research to ensure the VPN provider you choose is as trustworthy as possible.
Jurisdiction_KEY: |
Jurisdiction
Operating_outside_the_fiveninefourteeneyes_countries_is_not_a_guarantee_of_privacy_necessarily_an_KEY: |
Operating outside the five/nine/fourteen-eyes countries is not a guarantee of privacy necessarily, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on <a href="{{ '/providers/#ukusa' | translate_page }}">global mass surveillance and avoiding the US and UK</a> to learn more about why we feel this is important.