diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index 1841d765..ec7afb32 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -1,321 +1,235 @@ -

Privacy-Conscious Email Providers - No Affiliates

+

Recommended Email Services

-
- - - - - - - - - - - - - - +
-
+
+
+ ProtonMail +
+
+

ProtonMail Free

+

ProtonMail.com is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. ProtonMail is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.

-
- - - - - - - - - - +

Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (eg. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/Year which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:, From:, Date: and Subject: (this is likely to change when v4.0 of ProtonMail is released).

- - - - - - - - - - - +
Domains and Aliases
+

Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.

- - - - - - - - - - - +
Account Security
+

ProtonMail supports TOTP two factor authentication only. The use of a U2F security key is not yet supported. ProtonMail is planning to implement U2F upon completion of their Single Sign On (SSO) code.

- - - - - - - - - - - +
Data Security
+

ProtonMail has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.

- - - - - - - - - - - +
Email Encryption
+

ProtonMail has integrated OpenPGP encryption in their webmail. Emails to other ProtonMail users are encrypted automatically, and encryption to non-ProtonMail users with a OpenPGP key can be enabled easily in your account settings. They also allow you to encrypt messages to non-ProtonMail users without the need for them to sign up for a ProtonMail account or use software like OpenPGP.

+

ProtonMail also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of ProtonMail to find the OpenPGP keys of ProtonMail users easily, for cross-provider E2EE.

- - - - - - - - - - - +
.onion Service
+

ProtonMail is accessible via Tor at protonirockerxow.onion.

- - - - - - - - - - - +
Extra Functionality
+

ProtonMail offers a "Visionary" account for €24/Month, which also enables access to ProtonVPN in addition to providing multiple accounts, domains, aliases, and extra storage.

+ + +
+
+ Mailbox +
+
+

Mailbox.org €12/Year

+

Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed.

-
- - - - - - - - - - +
Domains and Aliases
+

Mailbox.org lets users use their own domain and they support catch-all addresses. Mailbox.org also supports subaddressing, which is useful for users who don't want to purchase a domain.

- - - - - - - - - - - +
Payment Methods
+

Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofort.

- - - - - - - - - - - +
Account Security
+

Mailbox.org supports two factor authentication for their webmail only. You can use either TOTP or a Yubikey via the Yubicloud. Web standards such as U2F and WebAuthn are not yet supported.

- -
Email ProviderWebsiteSinceJurisdictionStorageYearly PriceBitcoinEncryptionOwn Domain
- Disroot - - - - - 2015 - - Netherlands - - 1 GBFreeAcceptedBuilt-inYes
- Kolab Now - - - - - 2010 - - Switzerland - - 2 GB$ 60AcceptedBuilt-inYes
- mailbox.org +
Payment Methods
+

ProtonMail accepts Bitcoin in addition to accepting credit/debit cards and PayPal.

-
- - - - 2014 - - Germany - - 2 GB12 €NoBuilt-inYes
- Mailfence - - - - - 2013 - - Belgium - - 500 MBFreeAcceptedBuilt-inYes
- Posteo - - - - - 2009 - - Germany - - 2 GB12 €NoBuilt-inNo
- ProtonMail - - - - - - - - 2013 - - Switzerland - - 500 MBFreeAcceptedBuilt-inYes
- Runbox - - - - - 1999 - - Norway - - 1 GB$ 19.95AcceptedNoYes
- Soverin - - - - - 2015 - - Netherlands - - 25 GB29 €NoNoYes
- StartMail - - - - - 2014 - - Netherlands - - 10 GB$ 59.95AcceptedBuilt-inYes
- Tutanota - - - - - 2011 - - Germany - - 1 GBFreeNoBuilt-inYes
+
Data Security
+

Mailbox.org allows for encryption of incoming mail using their encrypted mailbox. New messages that you receive will then be immediately encrypted with your public key. This only protects message content while at rest so you should request that the sender encrypt the email message before sending in order to ensure confidentiality.

+

However, Open-Exchange, the software platform used by Mailbox.org, does not support the encryption of your address book and calendar. A standalone option may be more appropriate for that information.

+ +
Email Encryption
+

Mailbox.org has integrated E2EE encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also allow remote recipients to decrypt an email on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.

+

Mailbox.org also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Mailbox.org to find the OpenPGP keys of Mailbox.org users easily, for cross-provider E2EE.

+ +
.onion Service
+

You can access your Mailbox.org account via IMAP/SMTP using their .onion service. However, their webmail interface cannot be accessed via their .onion service, and users may experience TLS certificate errors.

+ +
Extra Functionality
+

All accounts come with limited cloud storage that can be encrypted. Mailbox.org also offers the alias @secure.mailbox.org, which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all.

+
+ +
+
+ Posteo +
+
+

Posteo €12/Year

+

Posteo.de is an email provider that focuses on anonymous, secure, and private email. Their servers are powered by 100% sustainable energy. They have been in operation since 2009. Posteo is based in Germany and has a free 14-day trial. Posteo comes with 2 GB for the monthly cost and an extra gigabyte can be purchased for €0.25 per month.

+ +
Domains and Aliases
+

Posteo does not allow the use of custom domains, however users may still make use of subaddressing.

+ +
Payment Methods
+

Posteo does not accept Bitcoin or other cryptocurrencies as a form of payment, however they do accept cash-by-mail. They also accept credit/debit cards, bank transfers, and PayPal, and claim that PII (personally identifiable information) that they receive in connection with these payment methods is not linked to your account.

+ +
Account Security
+

Posteo supports two factor authentication for their webmail only. You can use either TOTP a Yubikey with TOTP. Web standards such as U2F and WebAuthn are not yet supported.

+ +
Data Security
+

Posteo has zero access encryption for email storage. This means the messages stored in your account are only readable by you.

+

Posteo also supports the encryption of your address book contacts and calendars at rest. However, Posteo still uses standard CalDAV and CardDAV for calendars and contacts. These protocols do not support E2EE (End-To-End Encryption). A standalone option may be more appropiate.

+ +
Email Encryption
+

Posteo has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also support the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Posteo to find the OpenPGP keys of Posteo users easily, for cross-provider E2EE.

+ +
.onion Service
+

Posteo does not operate a .onion service.

+ +
Extra Functionality
+

Posteo allows users to set up their own mailing lists. Each account can create one list for free.

+
+
+
+
+ Soverin +
+
+

Soverin €29/Year

+

Soverin.net is an email provider which focuses on being private, ad-free, and powered by sustainable energy. They have been in operation since 2015. Soverin is based in Amsterdam and does not have a free trial. Accounts start at 25 GB.

+ +
Domains and Aliases
+

Soverin lets users use their own domain. Soverin users can also use catch-all and aliases for domains they own. Soverin also allows for subaddressing, which is useful for users who don't want to purchase a domain.

+ +
Payment Methods
+

Soverin accepts Bitcoin as payment. They also accept credit/debit cards, PayPal, and the Netherlands-specific payment gateway iDEAL.

+ +
Account Security
+

Soverin supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.

+ +
Data Security
+

Soverin has encryption at rest however it doesn't appear to be "zero access", meaning it is technically possible for them to decrypt the data they have.

+

Soverin also uses the standard CalDAV and CardDAV protocols for calendars and contacts, which do not support E2EE. A standalone option may be more appropriate.

+ +
Email Encryption
+

Soverin has integrated encryption in their webmail, which simplifies sending messages to users. However, Soverin has not integrated a Web Key Directory (WKD) for users on their platform.

+ +

.onion Service
+

Soverin does not operate a .onion service.

+ +
Extra Functionality
+

Soverin also providers users with space for a personal webpage.

+
+
+
+
+ Disroot +
+
+

Disroot Free

+

Disroot offers email amongst other services. The service is maintained by volunteers and its community. They have been in operation since 2015. Disroot is based in Amsterdam. Disroot is free and uses open source software such as Rainloop to provide service. Users support the service through donations and buying extra storage. The mailbox limit is 1 GB, but extra storage can be purchased 0.15€ per GB per month paid yearly.

+ +
Domains and Aliases
+

Disroot lets users use their own domain. They have aliases, however you must manually apply for them.

+ +
Payment Methods
+

Disroot accepts Bitcoin and Faircoin as payment methods. They also accept PayPal, direct bank deposit, and Patreon payments. Disroot is a not-for-profit organization that also accepts donations through Liberapay, Flattr, and Monero, but these payment methods cannot be used to purchase services.

+ +
Account Security
+

Disroot supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.

+ +
Data Security
+

Disroot uses full disk encryption. However, it doesn't appear to be "zero access", meaning it is technically possible for them to decrypt the data they have.

+

Disroot also uses the standard CalDAV and CardDAV protocols for calendars and contacts, which do not support E2EE. A standalone option may be more appropriate.

+ +
Email Encryption
+

Disroot allows for encrypted emails to be sent from their webmail application using OpenPGP. However, Disroot has not integrated a Web Key Directory (WKD) for users on their platform.

+ +
.onion Service
+

Disroot does not operate a .onion service.

+ +
Extra Functionality
+

They offer other services such as NextCloud, XMPP Chat, Etherpad, Ethercalc, Pastebin, Online polls and a Gitea instance. They also have an app available in F-Droid.

+
+
+
+
+ Tutanota +
+
+

Tutanota Free

+

Tutanota.com is an email service with a focus on security and privacy through the use of encryption. Tutanota has been in operation since 2011 and is based in Hanover, Germany. Accounts start with 1GB storage with their free plan.

+

Tutanota doesn't allow the use of third-party email clients. There are plans to allow Tutanota pull email from external email accounts using the IMAP protocol. Email import is currently not possible.

+

Emails can be exported individually or by bulk selection. Tutanota does not allow for subfolders as you might expect with other email providers.

+

Tutanota is working on a desktop client and they have an app available in F-Droid. They also have their app in conventional stores such as App Store on iOS and Google Play for Android.

+ +
Domains and Aliases
+

Paid Tutanota accounts can use up to 5 aliases and custom domains. Tutanota doesn't allow for subaddressing (plus addresses), but you can use a catch-all with a custom domain.

+ +
Payment Methods
+

Tutanota accepts only credit cards and PayPal.

+ +
Account Security
+

Tutanota supports two factor authentication. Users can either use TOTP or U2F. U2F support is not yet available on Android.

+ +
Data Security
+

Tutanota has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.

+ +
Email Encryption
+

Tutanota does not use OpenPGP. Tutanota users can only receive encrypted emails when external users send them through a temporary Tutanota mailbox.

+

Tutanota does have plans to support AutoCrypt. This would allow for external users to send encrypted emails to Tutanota users as long as their email client supports the AutoCrypt headers.

+ +
.onion Service
+

Tutanota does not operate a .onion service but may consider it in the future.

+ +
Extra Functionality
+

Tutanota offers the business version of Tutanota to non-profit organizations for free or with a heavy discount.

+ +

Tutanota also has a business feature called Secure Connect. This ensures customer contact to the business uses E2EE. The feature costs €240/year.

+
+
- -

Interesting Email Providers Under Development

- - - -

Become Your Own Email Provider

- -Mail-in-a-Box -

Mail-in-a-Box lets you become your own mail service provider in a few easy steps. It's sort of like making your own Gmail, but one you control from top to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you don't need to be a technology expert to set it up. More: https://mailinabox.email/

- -Mailcow -

Mailcow is a slightly more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mailserver with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. More: Mailcow Dockerized docs

diff --git a/_includes/sections/email-warning.html b/_includes/sections/email-warning.html new file mode 100644 index 00000000..ac524a13 --- /dev/null +++ b/_includes/sections/email-warning.html @@ -0,0 +1,10 @@ + +
+
Warning
+
+

When using end-to-end encryption (E2EE) technology like OpenPGP, email will still have some metadata that is not encrypted in the header of the email. Read more about email metadata.

+

OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. How do I protect my private keys?

+

Rather than use email for prolonged conversations, consider using a medium that does support Forward secrecy.

+ Recommended Instant Messengers +
+
diff --git a/assets/img/svg/3rd-party/anonaddy-dark.svg b/assets/img/svg/3rd-party/anonaddy-dark.svg new file mode 100644 index 00000000..02562e5d --- /dev/null +++ b/assets/img/svg/3rd-party/anonaddy-dark.svg @@ -0,0 +1,2 @@ + + diff --git a/assets/img/svg/3rd-party/anonaddy.svg b/assets/img/svg/3rd-party/anonaddy.svg new file mode 100644 index 00000000..9928c50f --- /dev/null +++ b/assets/img/svg/3rd-party/anonaddy.svg @@ -0,0 +1,2 @@ + + diff --git a/pages/providers/email.html b/pages/providers/email.html index 974e0018..78a7e353 100644 --- a/pages/providers/email.html +++ b/pages/providers/email.html @@ -1,27 +1,263 @@ --- layout: page permalink: /providers/email/ -title: "Best Secure Email Providers for Privacy" +title: "Private Email Providers" description: "Find a secure email provider that will keep your privacy in mind. Don't settle for ad-supported platforms. Never trust any company with your privacy, always encrypt." --- -
-
Warning
-
-

Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to accidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.

-

We recommend the following email providers for routine notifications and messages from other services that require an email address. For communications that need to be safe and secure, you should use a dedicated instant messaging tool, such as Signal.

- Recommended Instant Messengers -
-
+{% include sections/email-warning.html %} {% include sections/email-providers.html %} -

Related Information

+
+

Our Email Provider Criteria

- +

Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing a Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you.

+ +
+
+
+

Jurisdiction

+

Operating outside the five/nine/fourteen-eyes countries is not necessarily a guarantee of privacy, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on global mass surveillance and avoiding the US and UK to learn more about why we feel this is important.

+
+
+

Minimum to Qualify:

+
    +
  • Operating outside the USA or other Five Eyes countries.
  • +
+
+
+

Best Case:

+
    +
  • Operating outside the USA or other Fourteen Eyes countries.
  • +
  • Operating inside a country with strong consumer protection laws.
  • +
+
+ +
+

Technology

+

We regard these features as important in order to provide a safe and optimal service to users. Users should consider the provider which has the features they require.

+
+
+

Minimum to Qualify:

+
    +
  • Encrypts account data at rest.
  • +
  • Integrated webmail encryption provides convenience to users who want improve on having no E2EE encryption.
  • +
+
+
+

Best Case:

+
    +
  • Encrypts account data at rest with zero-access encryption.
  • +
  • Allow users to use their own domain name. Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad, be acquired by another company which doesn't prioritize privacy etc.
  • +
  • Support for WKD to allow improved discovery of public OpenPGP keys via HTTP.
    GnuPG users can get a key by typing: gpg --locate-key example_user@example.com
  • +
  • Support for a temporary mailbox for external users. This is useful when you want to send a encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
  • +
  • Availability of the email provider's services via an onion service.
  • +
  • Subaddressing support.
  • +
  • Catch all or aliases for users who own their own domains.
  • +
  • Use of standard email access protocols such as IMAP, SMTP or JMAP. Standard access protocols ensure customers can easily download all of their email,should they want to switch to another provider.
  • +
+
+ +
+

Privacy

+

We prefer our recommended providers to collect as little data as possible.

+
+
+

Minimum to Qualify:

+
    +
  • Protect sender's IP address. Filter it from showing in the Received header field.
  • +
  • Don't require personally identifiable information (PII) besides username and password.
  • +
  • Privacy policy that meets the requirements defined by the GDPR
  • +
+
+
+

Best Case:

+
    +
  • Accepts Bitcoin, cash, and other forms of cryptocurrency and/or anonymous payment options (gift cards, etc.)
  • +
+
+ +
+

Security

+

Email servers deal with a lot of very sensitive data. We expect that providers will adopt best industry practices in order to protect their users.

+
+
+

Minimum to Qualify:

+ +
+
+

Best Case:

+
    +
  • Support for hardware authentication, ie U2F and WebAuthn. U2F and WebAuthn are more secure as they use a private key stored on a client-side hardware device to authenticate users, as opposed to a shared secret that is stored on the web server and on the client side when using TOTP. Furthermore, U2F and WebAuthn are more resistant to phishing as their authentication response is based on the authenticated domain name.
  • +
  • Zero access encryption, builds on encryption at rest. The difference being the provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server.
  • +
  • DNS Certification Authority Authorization (CAA) Resource Record in addition to DANE support.
  • +
  • Implementation of Authenticated Received Chain (ARC), this is useful for users who post to mailing lists RFC8617.
  • +
  • Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
  • +
  • Website security standards such as:
  • + +
+
+ +
+

Trust

+

You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.

+
+
+

Minimum to Qualify:

+
    +
  • Public-facing leadership or ownership.
  • +
+
+
+

Best Case:

+
    +
  • Public-facing leadership.
  • +
  • Frequent transparency reports.
  • +
+
+ +
+

Marketing

+

With the email providers we recommend we like to see responsible marketing.

+
+
+

Minimum to Qualify:

+
    +
  • Must self host analytics (no Google Analytics etc). The provider's site must also comply with DNT (Do Not Track) for those users who want to opt-out.
  • +
+

Must not have any marketing which is irresponsible:

+
    +
  • Claims of "unbreakable encryption". Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
  • +
  • Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know users can quite easily deanonymize themselves in a number of ways, eg:
  • +
      +
    • Reusing personal information eg. (email accounts, unique pseudonyms etc) that they accessed without anonymity software (Tor, VPN etc)
    • +
    • Browser fingerprinting
    • +
    +
+
+
+

Best Case:

+
    +
  • Clear and easy to read documentation. This includes things like, setting up 2FA, email clients, OpenPGP, etc.
  • +
+
+ +
+

Additional Functionality

+

While not strictly requirements, there are some factors we looked into when determining which providers to recommend.

+
+
+
+
+ +

Email encryption

+
+
+
+

What is end-to-end encryption (E2EE) encryption in email?

+

End-to-end encryption (E2EE) is a way of encrypting email contents so that nobody but the recipient(s) can read the email message.

+

How can I encrypt my email?

+

The standard way to do email E2EE and have it work between different email providers is with OpenPGP. There are different implementations of the OpenPGP standard, the most common being GnuPG and OpenPGP.js.

+

There is another standard that was popular with business called S/MIME, however it requires a certificate issued from a Certificate Authority (not all of them issue S/MIME certificates). It has support in G Suite Enterprise/Education and Office 365 Business or Exchange Server 2016, 2019.

+

What software can I use to get E2EE?

+

Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the email clients we recommend. This can be less secure as you are now relying on email providers to ensure that their encryption implementation works and has not been compromised in anyway.

+
+
+

How do I protect my private keys?

+

A smartcard (such as a Yubikey or Nitrokey) works by receiving an encrypted email message from a device (phone, tablet, computer etc) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.

+

It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.

+
+
+
+ +

Email metadata

+
+
+
+

Who can see the email metadata?

+

Email metadata is able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients. Sometimes email servers will also use external parties to protect against spam.

+

What is email metadata?

+

Email software will often show some visible headers that you may have seen such as: To, From, Cc, Date, Subject. +

+

When is email metadata used?

+

Client software may use it to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among other purposes not transparent to the user.

+
+
+

Where is the email metadata?

+

Email metadata is stored in the message header of the email message.

+

Why can't email metadata be E2EE?

+

Email metadata is is cruicial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally and is also optional, therefore, only the message content is protected.

+

How is my metadata protected?

+

When emails travel between email providers an encrypted connection is negotiated using Opportunistic TLS. This protects the metadata from outside observers, but as it is not E2EE, server administrators can snoop on the metadata of an email.

+
+
+
+ +
+ +

Email cloaking services

+
+ + AnonAddy + +

AnonAddy lets users create aliases that forward to their email address. Can be self-hosted. Source code on GitHub.

+
+ +

Self-hosting Email

+
+

Advanced users may consider setting up their own email server. Mailservers require attention and continuous maintenance in order to keep things secure and mail delivery reliable.

+

Combined software solutions

+ + Mail-in-a-Box + +
+

Mail-in-a-Box is an automated setup script for deploying a mail server on Ubuntu. Its goal is to make it easier for users to set up their own mail server.

+ + Mailcow + +

Mailcow is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mailserver with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. Mailcow Dockerized docs

+ +

For a more manual approach we've picked out these two articles.

+ +
+ +

Related Email Articles

+
+
+ +
+
diff --git a/pages/software/email.html b/pages/software/email.html index 0366201c..1ce7dd68 100644 --- a/pages/software/email.html +++ b/pages/software/email.html @@ -5,14 +5,7 @@ title: "Email Clients" description: "Discover free, open-source, and secure email clients, along with some email alternatives you may not have considered." --- -
-
Warning
-
-

Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to accidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.

-

We recommend the following email providers for routine notifications and messages from other services that require an email address. For communications that need to be safe and secure, you should use a dedicated instant messaging tool, such as Signal.

- Recommended Instant Messengers -
-
+{% include sections/email-warning.html %} {% include sections/email-clients.html %}