Guides

The Tuta Guides help you become more private on the web.

  • Why your company needs email encryption

    Regardless of a company’s size, location, or industry, using email for professional business communications is vital, and communicating encrypted is often essential. Sending emails is a quick, and convenient way for companies to communicate both internally and externally. While it’s the go-to professional means of communication, it poses security and privacy threats for companies.

  • What is a password hash: Cryptography Basics

    As data leaks continue to dominate the tech news cycle, we often hear that emails and passwords were exposed. But what is a hashed password? How does it differ from a non-hashed password and what does "salt" have to do with anything? Let’s dive into these topics and more in today’s guide to cryptography.

  • Best Google Calendar alternative: end-to-end encrypted Calendar with Tuta.

    As people become more aware of Google’s endless data breaches and lack of user privacy, many are opting for privacy-focused app alternatives. A quick way to ditch Google Calendar is to get a free end-to-end encrypted calendar with Tuta!

  • Email aliases: What is an alias and how does it improve online security?

    An email alias is an additional email address, like a mask or costume, that you can use for a special purpose while protecting your primary address. Tuta Mail lets you get multiple aliases in any of the paid versions. You can use these additional addresses to receive and send secure emails under different identities but using the same email account. In this post, we fill you in on everything you need to know on how alias email addresses protect your identity and security, when you should use use email aliases, and to create unique aliases easily.

  • Ultimate guide to be private and secure on dating apps

    Is it possible to balance getting to know someone while keeping personal data secure? Let’s find out. We’ve compiled our own list of suggestions for balancing privacy and openness with online dating apps.

  • How to remove your personal information from the internet (The ultimate guide)

    As we share more and more of our personal information online, there’s a massive risk that our data gets abused. If you’ve already become a victim of online harassment, stalking, cyberbullying or other cyber threats, you will know how important it is to keep your personal information off the web. But how to achieve this if your data is already available online? Check our guide to find out!

  • Looking to drop Google? Here are the best Google Maps alternatives for finding your way.

    It has never been easier to visit a bustling unknown city or finding a hidden restaurant with the rise of Google Maps. This ease of navigation has not come without a price, that being the erosion of our privacy.

  • How to De-Google your life: The ultimate list of best private Google alternatives.

    DeGoogling has become a trend – there’s even a Subreddit about it with more than 100K members! So it’s time for your to learn how to live your life without Google. It’s not only easier than you think, going Google-free will also make your feel safer, more private – and best of all: happier. So check out our top Google replacements for best privacy!

  • All The Data Facebook Collects - And How To Stop This

    Facebook has positioned itself as an internet cornerstone. From humble beginnings, the tech giant has become a major data predator. Let's take a look at what kinds of information Facebook is collecting about you both on and off their namesake social media platform.

  • 10 types of identity theft and how to spot the warning signs.

    Every day we are able to do more and more tasks online. Things that used to require us to physically go somewhere like transferring money or booking an appointment are now easily completed in seconds online. Because everything is moving online, our personal data is becoming digitally available as well, and for cybercriminals this digital data linked to our identity is extremely valuable. Unfortunately, with this move to becoming digitalized, there has been an increase in activity of cybercriminals and identity theft. In this guide, we look at the 10 kinds of identity theft, how to spot signs of ID theft and how to protect yourself and your data from fraud.

  • What is ciphertext?

    When it comes to encryption of any kind, technical documentation often refers to both plaintext and ciphertext, but what do these terms mean? The following article will explain in general terms what is considered plaintext, what is ciphertext, and how do we differ between the two. Let’s get started!

  • Protect your digital identity – must read tips from the Tuta Team.

    As everything is becoming digital and moving online, our identity and personal data is, too. Many of us are quick to hand out our cellphone numbers, email addresses, and even social security numbers, passport or ID numbers. While handing out our personal details allows us to get things done efficiently (thank you internet!), it also leaves room for external threats. This is why protecting your digital identity has become one of the most important tasks to stay safe online. There are a few easy practices you can integrate into your online routine to ensure you keep your online data secure.