⚠️ Disclaimer
No email service is endorsed. This is educational content only. All email providers have potential risks and may be compromised or compelled to cooperate with authorities. Email is inherently insecure - even encrypted email reveals metadata. Jurisdiction matters significantly. Always research current practices and consider your specific threat model.
Email Security Reality
Email was designed in the 1970s without privacy or security in mind. Fundamental limitations include:
- Metadata exposure: Sender, recipient, timestamps, and subjects are usually visible
- Server storage: Emails are stored on servers, often indefinitely
- Transit vulnerabilities: Messages pass through multiple servers
- Endpoint security: Devices can be compromised
- Legal requests: Providers can be compelled to provide data
💡 Email vs. Messaging
For truly sensitive communications, consider using Signal or other encrypted messaging apps instead of email. Email should be treated as inherently insecure, similar to sending a postcard through the mail.
Secure Email Providers
ProtonMail
★★★★☆Jurisdiction: Switzerland
Strengths: End-to-end encryption, no logs, Swiss privacy laws
Weaknesses: Metadata still visible, legal requests possible
Best For: General secure email, business use
Tutanota
★★★★☆Jurisdiction: Germany
Strengths: Subject line encryption, full-text search, open source
Weaknesses: EU jurisdiction, limited features in free tier
Best For: Privacy-conscious individuals, Europeans
Guerrilla Mail
★★★★☆Jurisdiction: Various
Strengths: Disposable email, no registration, temporary
Weaknesses: Not for long-term use, limited features
Best For: One-time registrations, temporary communications
Riseup
★★★★☆Jurisdiction: United States
Strengths: Activist-focused, donation-funded, commitment to privacy
Weaknesses: US jurisdiction, invitation-only
Best For: Activists, journalists, privacy advocates
Posteo
★★★★☆Jurisdiction: Germany
Strengths: Anonymous payment, green energy, privacy-focused
Weaknesses: EU jurisdiction, German laws
Best For: European users, environmentally conscious
Disroot
★★★★☆Jurisdiction: Netherlands
Strengths: Decentralized, multiple services, community-driven
Weaknesses: EU jurisdiction, smaller organization
Best For: Privacy enthusiasts, decentralization advocates
Email Providers to Avoid
Gmail
★☆☆☆☆Issues: Extensive data mining, advertising, Google tracking ecosystem
Surveillance Risk: Very high
Yahoo Mail
★☆☆☆☆Issues: Data breaches, government cooperation, advertising
Surveillance Risk: Very high
Outlook/Hotmail
★☆☆☆☆Issues: Microsoft tracking, government cooperation, data collection
Surveillance Risk: Very high
AOL Mail
★☆☆☆☆Issues: Owned by Verizon, data collection, poor security
Surveillance Risk: High
Email Encryption
PGP/GPG Encryption
- Concept: End-to-end encryption for email content
- Key management: Requires key generation and distribution
- Metadata: Subject lines and headers remain visible
- Complexity: Difficult for average users
- Tools: Thunderbird with Enigmail, GPG Suite
S/MIME Encryption
- Concept: Certificate-based email encryption
- Enterprise focus: Common in business environments
- Certificate authorities: Relies on trusted CAs
- Built-in support: Supported by most email clients
Email Client Security
Secure Email Clients
- Thunderbird: Open source, plugin support, cross-platform
- Claws Mail: Lightweight, privacy-focused, Linux/Windows
- K-9 Mail: Android client with privacy features
- FairEmail: Privacy-focused Android client
- Apple Mail: Decent privacy with proper configuration
Email Client Configuration
- Disable HTML: View emails as plain text
- Block images: Prevent tracking pixels
- Disable JavaScript: Prevent malicious scripts
- Use IMAP over SSL/TLS: Encrypt connection to server
- Disable auto-download: Prevent automatic content loading
Email Security Best Practices
Account Security
- Strong passwords: Use unique, complex passwords
- Two-factor authentication: Enable 2FA where available
- Regular password changes: Update passwords periodically
- Account recovery: Secure recovery options
- Login monitoring: Review login activity regularly
Email Hygiene
- Compartmentalization: Use different emails for different purposes
- Disposable emails: Use temporary emails for registrations
- Email aliases: Use aliases to protect main address
- Regular cleanup: Delete old emails regularly
- Avoid personal info: Don't include sensitive details
Email Aliases and Forwarding
Alias Services
- AnonAddy: Anonymous email forwarding
- SimpleLogin: Email alias service
- 33Mail: Disposable email addresses
- Guerrilla Mail: Temporary email addresses
Self-Hosted Aliases
- Catch-all addresses: yourname+service@domain.com
- Subdomain aliases: service.yourname@domain.com
- Custom domains: Full control over email addresses
Self-Hosted Email
Advantages
- Complete control: Full control over data and privacy
- No third-party trust: Don't rely on email providers
- Custom configuration: Tailored security settings
- Cost effective: Cheaper for multiple users
Challenges
- Technical complexity: Requires server administration skills
- Spam filtering: Difficult to implement effectively
- Deliverability: Major providers may block self-hosted email
- Maintenance: Requires ongoing updates and monitoring
- Backup and reliability: Single point of failure
Email Threats and Attacks
Phishing
Fake emails designed to steal credentials or information. Always verify sender authenticity and avoid clicking suspicious links.
Malware Attachments
Malicious files that can compromise devices. Never open unexpected attachments, especially from unknown senders.
Tracking Pixels
Invisible images that track email opens and reader behavior. Disable image loading in email clients.
Metadata Analysis
Even encrypted email reveals communication patterns. Use multiple accounts and vary timing patterns.
Email Operational Security
High-Risk Communications
- Avoid email entirely: Use Signal or other encrypted messaging
- Disposable accounts: Create temporary accounts for sensitive topics
- Tor access: Access email through Tor Browser
- Public computers: Use public terminals for anonymous access
- Encrypted storage: Store sensitive emails in encrypted containers
Subject Line Security
- Avoid sensitive information: Never put secrets in subject lines
- Generic subjects: Use non-descriptive subjects
- Code words: Use agreed-upon code words if necessary
- Tutanota advantage: Encrypts subject lines
Email Retention and Deletion
Data Retention Policies
- Regular deletion: Delete emails after specific periods
- Automated cleanup: Set up automatic deletion rules
- Secure deletion: Use secure deletion tools
- Backup considerations: Ensure backups are also deleted
Mobile Email Security
Mobile Email Apps
- Official apps: Use provider's official apps when available
- K-9 Mail: Open source Android client
- FairEmail: Privacy-focused Android client
- Avoid: Third-party apps that store credentials
Mobile Security Settings
- App permissions: Limit access to contacts, location
- Screen locks: Protect device with PIN/biometrics
- Auto-lock: Automatically lock email app
- Remote wipe: Enable remote deletion if device is lost
Email Migration Strategy
Migrating from Gmail/Yahoo/Outlook
- Choose secure provider: Research and select privacy-focused service
- Export data: Download existing emails and contacts
- Set up forwarding: Forward emails during transition
- Update accounts: Change email on important services
- Gradual transition: Slowly phase out old account
- Delete old account: Securely delete after transition
Quick Start Guide
Immediate Actions (20 minutes)
- Choose a secure email provider (ProtonMail, Tutanota)
- Create account with strong password and 2FA
- Configure email client with security settings
- Set up email aliases for different purposes
- Start using secure email for sensitive communications
This Week
- Begin migrating from insecure providers
- Set up PGP encryption for sensitive contacts
- Configure email retention and deletion policies
- Update important accounts with new email
- Train contacts on email security practices
Next Steps
Email security is part of comprehensive communication security:
Encrypted Messaging Digital Compartmentalization Back to Guides