We have updated our Android and iOS apps so that you may now open the app with fingerprint and pin unlock!
This new feature is opt-in. Please check here how you can activate pin and biometrics unlock for your Tutanota app.
This week Google lost an appeal against a massive EU competition fine for squeezing rival shopping services on its
search engine. The fine of € 2.4 billion was issued in 2017 because Google displayed its own price-comparison
shopping service at the top of
the search results, which led to a huge disadvantage to competitors. Regardless of the fine, Google still holds so much
power over our search results that it defines how we view the world. This needs to change.
Google saves your purchasing history for years, pulling the information from email receipts received in Gmail.
Google keeps data such as price, delivery address, description, vendor, and more.
Deleting this personal information is going to be a very tedious task, particularly if you have a long list of
purchases. In this post, we'll quickly
explain how you can take back your privacy.
We have released a public beta of our Android app with fingerprint and pin unlock! We are testing the app in beta to
make sure no one loses their stored login credentials when enabling the new feature. Please make sure to write down
your password and recovery code before testing pin/fingerprint unlock.
In a huge victory for human rights, the European
Parliament calls for a ban on biometric mass surveillance and facial recognition.
After this important signal, civil rights organizations now want to exert even more pressure.
At Tutanota, every member of our development team is very passionate about privacy, security and open source. We work on
Tutanota not just because it is a job, but because it is very fulfilling to work on someting with a meaning: We work on a product that
enables everyone to protect their private data and with every new user who joins Tutanota, we feel like this is another
tiny victory against surveillance capitalism.
Google calendar allows its users to set their calendars to public, which includes these calendars in the search index.
The feature to share a Google calendar is a feature gone wrong as recent findings show: As making a Google calendar public is so easy,
users are setting their calendars to public without knowing
that once done, anyone can see their private data, even if they haven't shared the calendar link. This puts
your data at risk when using Google. Let's look at a private Google calendar alternative: Tutanota!
Backdoors to encryption - whether built-in by the companies themselves or discovered as vulnerabilities - can have
severe consequences. To demonstrate that encryption backdoors as propagated by politicians are a threat to everyone's security
online, we have collected the best of backdoor fails in recent history.
Email encryption - a term barely known ten years ago - is becoming mainstream thanks to automatically encrypted
services like Tutanota. We welcome this development as it makes the web much more secure for so many people. Yet, now
that many people choose to encrypt their emails, governments worldwide try to crack down on encryption, which is a
severe threat to freedom and democracy.
Seven years ago, we published the client code for your secure emails on GitHub. Since then hundreds of Tutanota users
have reviewed or forked the code, and built their own clients locally. We are very proud that we can now offer
open source and secure emails to everyone. To celebrate this great success, we offer you Tutanota Premium for only €1
per month. This special offer is valid today, tomorrow, and the day after tomorrow - because we believe encrypted
emails must be affordable to everyone!
The Australian government has been moving towards a surveillance state for some years already. Now they are putting the
nail in the coffin with an unprecedented surveillance bill that allows the police to
hack your device, collect or delete your data, and take over your social media accounts; without sufficient safeguards
to prevent abuse of these new powers.
Security specialist company Wiz discovered a vulnerability in the Microsoft Azure infrastructure that enabled them
to access, modify and delete data of thousands of Azure customers. Described as "the worst cloud vulnerability
you can imagine", the security company was able to get access to any customer database that they wanted. This vulnerability
is proof that data when stored in the cloud must be protected with end-to-end encryption at all times.