Tutanota is now Tuta. Read more
Read our blog to learn why privacy matters. And don't forget to get an encrypted mailbox yourself!
GET ENCRYPTED EMAIL
Time for a Google calendar alternative: Sharing a Google calendar to the public is easy - and dangerous.
Google calendar allows its users to set their calendars to public, which includes these calendars in the search index. The feature to share a Google calendar is a feature gone wrong as recent findings show: As making a Google calendar public is so easy, users are setting their calendars to public without knowing that once done, anyone can see their private data, even if they haven't shared the calendar link. This puts your data at risk when using Google. Let's look at a private Google calendar alternative: Tutanota!
2021-09-28 / First published: 2019-12-02
Best of backdoor fails in recent history.
Backdoors to encryption - whether built-in by the companies themselves or discovered as vulnerabilities - can have severe consequences. To demonstrate that encryption backdoors as propagated by politicians are a threat to everyone's security online, we have collected the best of backdoor fails in recent history.
Encrypted emails are constantly rising: 66% of Tutanota emails are end-to-end encrypted
Email encryption - a term barely known ten years ago - is becoming mainstream thanks to automatically encrypted services like Tutanota. We welcome this development as it makes the web much more secure for so many people. Yet, now that many people choose to encrypt their emails, governments worldwide try to crack down on encryption, which is a severe threat to freedom and democracy.
Celebrate with us seven years of open source emails!
Seven years ago, we published the client code for your secure emails on GitHub. Since then hundreds of Tutanota users have reviewed or forked the code, and built their own clients locally. We are very proud that we can now offer open source and secure emails to everyone. To celebrate this great success, we offer you Tutanota Premium for only €1 per month. This special offer is valid today, tomorrow, and the day after tomorrow - because we believe encrypted emails must be affordable to everyone!
Australia: Unprecedented surveillance bill rushed through parliament in 24 hours.
The Australian government has been moving towards a surveillance state for some years already. Now they are putting the nail in the coffin with an unprecedented surveillance bill that allows the police to hack your device, collect or delete your data, and take over your social media accounts; without sufficient safeguards to prevent abuse of these new powers.
The Microsoft database hack shows that data stored in the cloud must always be encrypted end-to-end.
Security specialist company Wiz discovered a vulnerability in the Microsoft Azure infrastructure that enabled them to access, modify and delete data of thousands of Azure customers. Described as "the worst cloud vulnerability you can imagine", the security company was able to get access to any customer database that they wanted. This vulnerability is proof that data when stored in the cloud must be protected with end-to-end encryption at all times.
How the free web fuels conspiracy theories.
Automated ad displays enable shady players on the web not only display their content to targeted audiences, it even helps them make money and build a whole business based on sensationalism and fake news. Whether it's about climate change denial or vaccination conspiracies, automated advertising software funds producers of sensationalist content enabling them to thrive.
Rotten Apples: iOS 15, personal privacy, and the on-going fight against CSAM.
This fall, Apple is planning to release iOS 15 which will begin scanning your devices and iCloud for known images depicting the sexual abuse of minors. Apple is attempting to assuage the public and claims that these features will scan personal devices and cloud storage “while designing for user privacy.” Is this yet another case of invasive surveillance hidden under the guise of protecting the children or is Apple attempting to walk the fine line between preventing the spread of abusive material and protecting user privacy?
Online services may (and do) scan all of your messages. Here is how you can protect yourself!
Beginning of July, the European Parliament has adopted a derogation for the ePrivacy regulation that allows companies to scan all private messages of all EU citizens, including chat messages and emails. The only good news about this is that scanning of private messages is voluntary. We can guarantee that your Tutanota messages remain private and will not be scanned. Here is why this piece of legislation is frighteningly bad.
NSO's Pegasus Scandal: Zero-Day, Zero-Clicks, Zero-Privacy?
It’s a bird! It’s a plane! No, it's another piece of surveillance software. This week we have been exposed to the Pegasus scandal. Pegasus is a piece of malware, publicly advertised and sold by the NSO Group that can infect mobile devices with little to no action required by the phone owner. The extensive eavesdropping made possible by Pegasus violates multiple laws. Thus, selling such tool must be banned - just like the trade in nuclear weapons is banned.