⚠️ Disclaimer

No email service is endorsed. This is educational content only. All email providers have potential risks and may be compromised or compelled to cooperate with authorities. Email is inherently insecure - even encrypted email reveals metadata. Jurisdiction matters significantly. Always research current practices and consider your specific threat model.

Email Security Reality

Email was designed in the 1970s without privacy or security in mind. Fundamental limitations include:

  • Metadata exposure: Sender, recipient, timestamps, and subjects are usually visible
  • Server storage: Emails are stored on servers, often indefinitely
  • Transit vulnerabilities: Messages pass through multiple servers
  • Endpoint security: Devices can be compromised
  • Legal requests: Providers can be compelled to provide data

💡 Email vs. Messaging

For truly sensitive communications, consider using Signal or other encrypted messaging apps instead of email. Email should be treated as inherently insecure, similar to sending a postcard through the mail.

Secure Email Providers

ProtonMail

★★★★☆

Jurisdiction: Switzerland

Strengths: End-to-end encryption, no logs, Swiss privacy laws

Weaknesses: Metadata still visible, legal requests possible

Best For: General secure email, business use

Tutanota

★★★★☆

Jurisdiction: Germany

Strengths: Subject line encryption, full-text search, open source

Weaknesses: EU jurisdiction, limited features in free tier

Best For: Privacy-conscious individuals, Europeans

Guerrilla Mail

★★★★☆

Jurisdiction: Various

Strengths: Disposable email, no registration, temporary

Weaknesses: Not for long-term use, limited features

Best For: One-time registrations, temporary communications

Riseup

★★★★☆

Jurisdiction: United States

Strengths: Activist-focused, donation-funded, commitment to privacy

Weaknesses: US jurisdiction, invitation-only

Best For: Activists, journalists, privacy advocates

Posteo

★★★★☆

Jurisdiction: Germany

Strengths: Anonymous payment, green energy, privacy-focused

Weaknesses: EU jurisdiction, German laws

Best For: European users, environmentally conscious

Disroot

★★★★☆

Jurisdiction: Netherlands

Strengths: Decentralized, multiple services, community-driven

Weaknesses: EU jurisdiction, smaller organization

Best For: Privacy enthusiasts, decentralization advocates

Email Providers to Avoid

Gmail

★☆☆☆☆

Issues: Extensive data mining, advertising, Google tracking ecosystem

Surveillance Risk: Very high

Yahoo Mail

★☆☆☆☆

Issues: Data breaches, government cooperation, advertising

Surveillance Risk: Very high

Outlook/Hotmail

★☆☆☆☆

Issues: Microsoft tracking, government cooperation, data collection

Surveillance Risk: Very high

AOL Mail

★☆☆☆☆

Issues: Owned by Verizon, data collection, poor security

Surveillance Risk: High

Email Encryption

PGP/GPG Encryption

  • Concept: End-to-end encryption for email content
  • Key management: Requires key generation and distribution
  • Metadata: Subject lines and headers remain visible
  • Complexity: Difficult for average users
  • Tools: Thunderbird with Enigmail, GPG Suite

S/MIME Encryption

  • Concept: Certificate-based email encryption
  • Enterprise focus: Common in business environments
  • Certificate authorities: Relies on trusted CAs
  • Built-in support: Supported by most email clients

Email Client Security

Secure Email Clients

  • Thunderbird: Open source, plugin support, cross-platform
  • Claws Mail: Lightweight, privacy-focused, Linux/Windows
  • K-9 Mail: Android client with privacy features
  • FairEmail: Privacy-focused Android client
  • Apple Mail: Decent privacy with proper configuration

Email Client Configuration

  • Disable HTML: View emails as plain text
  • Block images: Prevent tracking pixels
  • Disable JavaScript: Prevent malicious scripts
  • Use IMAP over SSL/TLS: Encrypt connection to server
  • Disable auto-download: Prevent automatic content loading

Email Security Best Practices

Account Security

  • Strong passwords: Use unique, complex passwords
  • Two-factor authentication: Enable 2FA where available
  • Regular password changes: Update passwords periodically
  • Account recovery: Secure recovery options
  • Login monitoring: Review login activity regularly

Email Hygiene

  • Compartmentalization: Use different emails for different purposes
  • Disposable emails: Use temporary emails for registrations
  • Email aliases: Use aliases to protect main address
  • Regular cleanup: Delete old emails regularly
  • Avoid personal info: Don't include sensitive details

Email Aliases and Forwarding

Alias Services

  • AnonAddy: Anonymous email forwarding
  • SimpleLogin: Email alias service
  • 33Mail: Disposable email addresses
  • Guerrilla Mail: Temporary email addresses

Self-Hosted Aliases

  • Catch-all addresses: yourname+service@domain.com
  • Subdomain aliases: service.yourname@domain.com
  • Custom domains: Full control over email addresses

Self-Hosted Email

Advantages

  • Complete control: Full control over data and privacy
  • No third-party trust: Don't rely on email providers
  • Custom configuration: Tailored security settings
  • Cost effective: Cheaper for multiple users

Challenges

  • Technical complexity: Requires server administration skills
  • Spam filtering: Difficult to implement effectively
  • Deliverability: Major providers may block self-hosted email
  • Maintenance: Requires ongoing updates and monitoring
  • Backup and reliability: Single point of failure

Email Threats and Attacks

🎣

Phishing

Fake emails designed to steal credentials or information. Always verify sender authenticity and avoid clicking suspicious links.

📎

Malware Attachments

Malicious files that can compromise devices. Never open unexpected attachments, especially from unknown senders.

👁️

Tracking Pixels

Invisible images that track email opens and reader behavior. Disable image loading in email clients.

🔍

Metadata Analysis

Even encrypted email reveals communication patterns. Use multiple accounts and vary timing patterns.

Email Operational Security

High-Risk Communications

  • Avoid email entirely: Use Signal or other encrypted messaging
  • Disposable accounts: Create temporary accounts for sensitive topics
  • Tor access: Access email through Tor Browser
  • Public computers: Use public terminals for anonymous access
  • Encrypted storage: Store sensitive emails in encrypted containers

Subject Line Security

  • Avoid sensitive information: Never put secrets in subject lines
  • Generic subjects: Use non-descriptive subjects
  • Code words: Use agreed-upon code words if necessary
  • Tutanota advantage: Encrypts subject lines

Email Retention and Deletion

Data Retention Policies

  • Regular deletion: Delete emails after specific periods
  • Automated cleanup: Set up automatic deletion rules
  • Secure deletion: Use secure deletion tools
  • Backup considerations: Ensure backups are also deleted

Mobile Email Security

Mobile Email Apps

  • Official apps: Use provider's official apps when available
  • K-9 Mail: Open source Android client
  • FairEmail: Privacy-focused Android client
  • Avoid: Third-party apps that store credentials

Mobile Security Settings

  • App permissions: Limit access to contacts, location
  • Screen locks: Protect device with PIN/biometrics
  • Auto-lock: Automatically lock email app
  • Remote wipe: Enable remote deletion if device is lost

Email Migration Strategy

Migrating from Gmail/Yahoo/Outlook

  1. Choose secure provider: Research and select privacy-focused service
  2. Export data: Download existing emails and contacts
  3. Set up forwarding: Forward emails during transition
  4. Update accounts: Change email on important services
  5. Gradual transition: Slowly phase out old account
  6. Delete old account: Securely delete after transition

Quick Start Guide

Immediate Actions (20 minutes)

  1. Choose a secure email provider (ProtonMail, Tutanota)
  2. Create account with strong password and 2FA
  3. Configure email client with security settings
  4. Set up email aliases for different purposes
  5. Start using secure email for sensitive communications

This Week

  1. Begin migrating from insecure providers
  2. Set up PGP encryption for sensitive contacts
  3. Configure email retention and deletion policies
  4. Update important accounts with new email
  5. Train contacts on email security practices

Next Steps

Email security is part of comprehensive communication security:

Encrypted Messaging Digital Compartmentalization Back to Guides