Are private email providers worth it?
I think I know the answer, bit maybe I'm missing something
Since proton only sends and receives encrypted emails to other proton accounts, that means that when you get or send an email to someone else, they have to send / receive unencrypted and there is no way for us to verify what they are doing. Right?
Also if most accounts are google Microsoft, they still get 90% of my emails. By switching to proton I think I've gained nothing, while losing convenience , added another trust point, and having two different companies have my data instead of just one
Proton drive, calendar and VPN I think are fine
Sorry for the poor syntax. I'm at work working on email related things, and this topic kept distracting me. I might correct it later
solrize
in reply to notarobot • • •notarobot
in reply to solrize • • •solrize
in reply to notarobot • • •commander
in reply to notarobot • • •hansolo
in reply to notarobot • • •Proton does offer what is essentially a self-contained PGP portal. You send anyone an email and they get a "hey, this is me, open the message below" thing and then a link to a message that's hosted on Proton servers. So your Granny doesn't need to set up a public/private key pair, you can just send the encrypted portal option.
No idea of Tuta or others do this.
Plus, no matter who you chose, you personally aren't feeding the Google algo. You can do what I do, which is you leave all the hyper data hungry services in the data eating world, just feeding on each other alone. Then you have real conversations over email or fediverse.
notarobot
in reply to hansolo • • •Yeah. I chose proton over tuta because of this option to send the link to the encrypted message. I think tuta does have it, but it didn't show the entire conversation. If you wanted to see the entire chain I think you and to either find the mates email to get the latest URL, or open each URL by itself.
The problem with those is that you have to exchange the password by some other means than the email itself, so it's really not practical for the other person
hansolo
in reply to notarobot • • •notarobot
in reply to hansolo • • •- One of the main uses of email is communication with companies. And they won't have a signal account just to exchange passwords with you
- doesn't work for emailing someone you have no say you want to send an email to... Idk a youtuber (first example I could think of where you know you want to talk to them but you have no other means to do so). They have their email published. Now what? You can't email them asking for their phone number so that you can exchange email passwords because they won't give it to you, and that exchange is happening unencrypted
- if I have a way to contact someone over signal, I'd rather use that than email
hansolo
in reply to notarobot • • •No. Email is just a non-centralized protocol. While not everyone uses it the same way, most normal people never use email to communicate with companies, who are increasingly forcing people to use chatbots anyway. So it's not even a reasonable point to make. Password protected emails are meant to be between people who have an established relationship. If a company needs someone to send them encrypted message, they'll have a platform for that, just like Wikileaks or ProPublica, so you're not making a valid argument about that.
If some Youtuber is someone that does anything privacy-related enough that they should be receiving encrypted emails, their public PGP key should be on their YT profile and you can send them an encrypted message anyway with that. Protocols and methods exist already to accomplish what you're talking about. You need to complain to the Youtuber for not practicing good security and privacy, not to Proton for not creating some mind-reading Diffie-Hellman scenario. Really, do you think that you can just send some random person a message that says "click link to open secret message!" and not expect it to just look like phishing?
If you'd rather use signal, use signal and send them an attachment encrypted with their PGP public key. This isn't hard, I don't even know why you're trying to argue all these weird non-existent edge cases like they're everyday issues.
notarobot
in reply to hansolo • • •i don't know your case, but for me using email is non optional. i can't "just use signal". i need an email for my government, i need an email because i need a github account, i need an email for any site i want to use, including lemmy. i just want to be able to do it privately. i'm just trying to determine if protonmail is actually private or just one big "trust me bro. we wont read you unencrypted messages as they enter or leave"
hansolo
in reply to notarobot • • •OK. Well, respectfully, I think it would be beneficial to find out more about how encryption, email servers, and encrypted messaging works. I think you're quite confused about the details here, and just getting a sense of the parts will help you in the long run. People use email differently - I don't use FB, so my main means of communication with family that is not Signal messages is email.
By "just use signal" I mean for sharing a password for a password protected email. Which you should only be sending to people you know already and can coordinate with. You're not sending password protected emails to random people or the government because it's not necessary for the reasons I explained earlier. If someone needs an encrypted message from ANYONE they will provide the method. Otherwise, they don't want encrypted messages and can't be trusted with data that should be encrypted.
Proton is secure, and I know because I had an old account I wanted to get access to and lost access to the recovery email, but had one on the same domain. I spent about a week doing back and forth emails with some guy who was trying to ask me to verify aspects of the account, which was my spam shield and dummy social media account and I hadn't used it for about a year. All he could see, when pressed, was header info: sender/receiver, date, time, ip address, sending agent. All things that are needed to route the message. It ended up being me able to confirm IP address and sending agent and access (I sent an email to my recovery address from an IP in this range on this date, last logged in on on this date, etc.). It was a pain for both of us.
notarobot
in reply to hansolo • • •0x0
in reply to hansolo • • •Tuta does too.
colournoun
in reply to notarobot • • •infjarchninja
in reply to notarobot • • •I use Tuta mail and protonmail.
There is no "unencrypted" transfer between sender and receiver if you both use tuta or proton.
If you send an email to me from a Gmail account, it is unencrypted until it reaches the Tuta servers and the Proton severs, once there it is encrypted and remains so until I login to my account to access the email.
TUTA MAIL:
The entire mailbox – emails, calendar and address book – are stored end-to-end encrypted in Tuta.
Data that Tuta encrypts end-to-end:
Emails, including subject lines and all attachments
Entire calendars, even metadata such as event notifications
Entire address book, not just parts of the contacts
Inbox rules / filters
And the entire search index.
Tuta uses symmetric (AES 256) and asymmetric encryption (RSA 2048 or ECC (x25519) and Kyber-1024 as quantum-safe algorithms) to encrypt emails end-to-end. When both parties use Tuta, all emails are automatically end-to-end encrypted (asymmetric encryption).
PROTONMAIL:
Emails from non-Proton Mail users to Proton Mail users
The email is encrypted in transit using TLS. It is then unencrypted and re-encrypted (by us) for storage on our servers using zero-access encryption. Once zero-access encryption has been applied, no-one except you can access emails stored on our servers (including us). It is not end-to-end encrypted, however, and might be accessible to the sender’s email service.
All messages in your Proton Mail mailbox are stored with zero-access encryption. This means we cannot read any of your messages or hand them over to third parties. This includes messages sent to you by non-Proton Mail users, although keep in mind if an email is sent to you from Gmail, Gmail likely retains a copy of that message as well.
Password-protected Emails are also stored end-to-end encrypted.
Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.
sjmulder
in reply to notarobot • • •Note that ProtonMail actually supports automatic encryption to email accounts that publish their public keys in a Web Key Directory, which I’ve set up for mine. When you type such an email address in the To field, it’ll turn into a special color with a lock symbol.
Likewise, ProtonMail also exposed a WKD so people can send encrypted emails to ProtonMail accounts. I don’t know of any mail clients that support this though (I used the command line to pull keys)
Jason2357
in reply to sjmulder • • •Wow, til I learn about WKD! I used to have a key on keyservers, but hated how that was basically a spam trap and the fact that anyone could upload a key there for my own address. It was easy because I own my own domain and already have a web server there.
I set it up and tested it with help from webkeydirectory.com/
Looks like it's being added to clients: wiki.gnupg.org/WKD/Distributio…
Web Key Directory Validator
Web Key Directory Validatorowenfromcanada
in reply to notarobot • • •0x0
in reply to notarobot • • •They'll have to follow a link but still...
Tuta: Turn ON privacy for free with secure emails, calendars & contacts | Tuta
Tutamonovergent 🛠️
in reply to notarobot • • •notarobot
in reply to monovergent 🛠️ • • •Drunk & Root
in reply to notarobot • • •flatbield
in reply to notarobot • • •There is an advantage of using a provider that suports MTA STS. This is Strict Transport Security and forces at least transport encryption.
There is an advantage to use a provider you pay for too and at least claims not to read your email.
It is also nice if they can host your domain and have good delivery.
Edit: I meant MTA STS not SMTP STS.
notarobot
in reply to flatbield • • •flatbield
in reply to notarobot • • •Google is promoting MTA-STS. MS is at least testing it and some others. Proton mail might support, check. I use NameCheap shared hosting mail. They support incoming but not outgoing.
Sure it is clear inside each org but secures between. Nice because you can secure in your org by contract. Not as good as e2ee of course.
notarobot
in reply to flatbield • • •flatbield
in reply to notarobot • • •notarobot
in reply to flatbield • • •flatbield
in reply to notarobot • • •Autonomous User
in reply to notarobot • • •notarobot
in reply to Autonomous User • • •Autonomous User
in reply to notarobot • • •notarobot
in reply to Autonomous User • • •Autonomous User
in reply to notarobot • • •Tuta has no IMAP, vendor lock-in, bad.
Proton has IMAP with extra steps, almost vendor lock-in, bad.
Gmail has IMAP, good. So, we can use it with our own libre app, with GPG, but first we need an account.
Making a new Gmail account is not private. Also, paying for paid Gmail is not private.
sh.itjust.works/comment/208023…
Drunk & Root
2025-09-04 01:38:13
notarobot
in reply to Autonomous User • • •int32
in reply to Autonomous User • • •Disroot | Disroot.org
disroot.orgint32
in reply to Autonomous User • • •Autonomous User
in reply to int32 • • •int32
in reply to Autonomous User • • •railcar
in reply to notarobot • • •notarobot
in reply to railcar • • •Auli
in reply to railcar • • •GlenRambo
in reply to Auli • • •JustEnoughDucks
in reply to railcar • • •pineapple
in reply to JustEnoughDucks • • •fubbernuckin
in reply to notarobot • • •Hold on, am I missing something? I don't see anyone in here talking about that time proton openly endorsed the Republican party. Did we forget about or forgive them for that? Is it just irrelevant right now? They backtracked later but like archive.ph/2yWGz
When organizations make a move like that, they usually don't stop pushing in that direction, even if they backtrack in response to pushback. While I'm sure they're still better than google, I have a hard time trusting them after that. It feels relevant to talk about because like you said, using proton is adding another trust point.
like this
sunzu2 likes this.
PoTayToes
in reply to fubbernuckin • • •notarobot
in reply to fubbernuckin • • •rumba
in reply to notarobot • • •Kind of tired of beating the dead horse on that story, but part of privacy is that you need to trust the company that you're dealing with.
He's out there openly praising on authoritarians move to install a puppet government and open the gateway to corporate corruption. If our privacy companies are going to be sneaky and dirty, we want it done in the shadows. All he had to do was stay quiet. But he got noisy, then the PR department started gaslighting, and none of that's a good look for a privacy company.
The thing is, Trump doesn't give two shits about anybody, and the guy running the company should have known this.
But now it's old news, it can die. He can prove that he can run the company by good faith measures and doing the right thing instead of by trying to gaslight people through PR.
sunzu2 likes this.
notarobot
in reply to rumba • • •rumba
in reply to notarobot • • •You have to trust that:
Code is good, but there's a lot of operational information there that doesn't get exposed by being open.
Code in the face of no malice wouldn't be a large worry. They rolled over on a French activist and doxxed them for the French government. Those logs should not have existed in a privacy company.
Again, this is all old news now. Let's see him make hard decisions to protect the clients and turn the PR side of things from "the empire did nothing wrong" to hey, let's have an open dialog.
notarobot
in reply to rumba • • •i don't care about their VPN. the issue you describe is very real, but it's inherit to all vpn providers. what i care right now, is their email service. you can switch vpn providers in less than 15 minutes, but email takes days. so i wouldn't want to go around doing all of that every time some employee says something stupid.
and btw, if you use native installed apps, then the worry of them serving malicious javascript goes way down because any change they make on the complied package would be very likely to be very obvios to someone, because its open source ( i won't go into detail here).
rumba
in reply to notarobot • • •sunzu2
in reply to fubbernuckin • • •Got banned on their sub for criticizing that clown Andy the bootlicker.
They are happy to shill free speech when they take your money, but no free speech when they get criticized.
Tells you what you need to know about corpo.
Their email is best in class though. Other services are mid at best.
Ardens
in reply to notarobot • • •notarobot
in reply to Ardens • • •Ardens
in reply to notarobot • • •notarobot
in reply to Ardens • • •That sounds like the worst option of all. At least I can trust google has some protections in place to stop employees from looking at you email, because if they didn't there would be thousands of cases all the time.
In your case, you never know who is looking. At any point a rogue admin can issue a bank password reset and just read the email
I've never heard of the term web hotel before. I'm guessing its web hosting
favoredponcho
in reply to notarobot • • •notarobot
in reply to favoredponcho • • •Ardens
in reply to notarobot • • •Sounds like you don't know what you are talking about. 😀 That's fine, but unless you know something about the topic, you shouldn't really be judging...
I know exactly who is looking. And I would also know if anyone tampers with the passwords. I guess you don't have the skills, and that's fine. You might even think that there's anything in the world that is totally secure. There's not a single thing that is secure.
Oh, what is this? - forbes.com/sites/zakdoffman/20…
notarobot
in reply to Ardens • • •Jason2357
in reply to notarobot • • •I wouldn't say you have gained nothing. The amount of data provided to google or microsoft when using their email is significantly more. For example, your app or client is checking email all of the time, giving them telemetry on your location and activity, all your devices, 24/7. Google logs and analyzes all of your interactions with Gmail's web pages, how long you have certain emails open for, what you don't bother to open, what you tag as important, etc.
Much of the one-way email you sign up for from companies and organizations come from smaller outfits like sendgrid or their own infrastructure, so you are cutting google out of information about your associations and interests.
Also, in regards to that 90%, you can either be part of the problem for all your contacts, or part of the solution. The network effect is huge.
notarobot
in reply to Jason2357 • • •int32
in reply to notarobot • • •1. don't use email, that's the ideal solution
2. use a provider like cock.li and send messages encrypted with pgp. this isn't ideal, pgp leaks a lot of data and cock.li gets sinkholed by most email providers.
3. use proton and encrypt emails with pgp, you have not much privacy but it's less worse than microsoft and not much convenience loss, except that proton doesn't allow email clients(at least if you don't pay), I don't know about ms).
Home — Cock.li E-mail Hosting
cock.linotarobot
in reply to int32 • • •Autonomous User
in reply to notarobot • • •notarobot
in reply to Autonomous User • • •int32
in reply to notarobot • • •sunzu2
in reply to int32 • • •a corporation is a legal extension of the state, hence why all of them will always collaborate when ordered by the courts or otherwise required by law.
some will even collaborate when they are not required by law such amazon ring providing pigs access for no reason, facebook censoring content per request of US or Israel... needless bullshit but hey it helps get government contracts ;)
bottom line, expecting corpo to do anything for you for 5 bucks a month is naive, at best they should not do it for no reason and they should not sell your data.
but even that is a tall order for these parasites.
int32
in reply to sunzu2 • • •