Accounts with third-party service providers were used “for exfiltration or infrastructure,” according to a post by law enforcement on LockBit’s seized darkweb domain.
What’s wrong with both Tuta and Proton? I’m by no means involved in any crime or anything, but I degooglefied and moved to Tuta for mail. Was considering self hosting, but I’ve been procrastinating it.
As you can see from this piece of news, an encrypted email service does nothing for your privacy. But at the same time it limits you and makes you a captive user. Which is ironic considering that’s probably why you left Google.
I mean, I left Google because I hated them tracking me 24/7, and trying to sell me stuff based on my profile, though privacy is indeed a concern. Any option you may recommend i could use while k move to a privet email server? I wanted to get out of Tuta anyway since their platform feels stiff.
Party of the snowden leaks were that the five eyes capture and record everything.
Everything.
Your pop solution with deletion only deletes your copy; not the one the NSA has. Maybe that’s not part of your threat model, which is fine, but it’s part of mine
Then you need to stop using email altogether. Encrypting only one server like Tuta or Proton does nothing if you correspond with people who are not on it.
What’s wrong with both Tuta and Proton? I’m by no means involved in any crime or anything, but I degooglefied and moved to Tuta for mail. Was considering self hosting, but I’ve been procrastinating it.
As you can see from this piece of news, an encrypted email service does nothing for your privacy. But at the same time it limits you and makes you a captive user. Which is ironic considering that’s probably why you left Google.
I mean, I left Google because I hated them tracking me 24/7, and trying to sell me stuff based on my profile, though privacy is indeed a concern. Any option you may recommend i could use while k move to a privet email server? I wanted to get out of Tuta anyway since their platform feels stiff.
Party of the snowden leaks were that the five eyes capture and record everything.
Everything.
Your pop solution with deletion only deletes your copy; not the one the NSA has. Maybe that’s not part of your threat model, which is fine, but it’s part of mine
Then you need to stop using email altogether. Encrypting only one server like Tuta or Proton does nothing if you correspond with people who are not on it.
I’ve been trying to explain this to people for years, but there’s so much blind love for Proton here that my comments are usually drowned out.