ProtonMail: an overview of a secure email service” free fullz 2021

As you probably know, the main email service providers are no longer trustworthy. Your email can be viewed by, say, Google employees or government officials, and if it’s a local service – rest assured, someone of your countrymen will be viewing it. Every day. Just for fun.

Contextual advertising, which has long been shamelessly hung up by Google, and recently began to hang up by Yandex, is also quite annoying. Especially when you go to the box after a month or two of absence, and see it all. After seeing all the suggestions recommended to me (on the basis of what and why exactly to me?) I made a decision about which I do not regret for 3 months already.

Thanks to the great Snowden for the timely information, goodbye soylara and yand, I’m off to Proton!

I call mail that cannot be scanned “E-mail 2.0”. And I am not ashamed to infect you with my desire for security and privacy.

To infect is an understatement.

Security? Paranoid security!!!

Consider what you will encounter if you follow the advice and want a Proton mailbox. You will need to come up with and remember 2 passwords: the first password will be entered to log in to the site, but will NOT give you access to the mailbox. To view the mailbox, you will need the second password, which also serves to decrypt the mail. The encryption operation is performed on the client side and already encrypted data is sent to the server, which rules out a MITM attack. There are no keys to your mailbox on the servers, so even in case of a visit from people with shoulder straps, the service staff will only be able to issue encrypted data.

The architecture is so thanks to the use of open source front-end encryption, which means user-side data encryption. You can get acquainted with OpenPGPjs libraries used by the service on this Github page.

In end-to-end encryption, the endpoints are: the sender and the intended recipient device. The message is encrypted locally on the sender’s device and then can only be decrypted on the recipient’s device. “End-to-end encryption” is commonly referred to as “client-side encryption” or “zero-touch encryption”, due to the fact that the email is processed using users’ end devices rather than centralized servers. There are 2 algorithms used for end-to-end encryption: symmetric and asymmetric.

The guys at ProtonMail don’t recommend people like Edward Snowden to use their service, but the warning seems more like a cultural excuse, like “we don’t want to deal with American agents, sorry.”

I learned about the Proton mail service from an old article on a website. Having pondered over the revelations of secret agents, having enjoyed the contextual advertising, having been horrified by the far from single cases of arrests of American citizens (though not the most exemplary people) I decided: neither Ukrainian sysadmins, nor Russian hackers, nor Barack O and Vladimir P… nor even Her Majesty Elizabeth 2.0… would be able to read my personal correspondence… No way. Not anywhere. Ever. Paranoia. Paranoia…

Among the many “perks” that mail entices users with are:

? Free (and no text).

? Freedom from EU legislation obliging the release of user information (Switzerland is not part of the EU).

? Freedom from similar U.S. law.

? Freedom from the authorities in Switzerland itself – local laws protect the integrity of the servers and without a special “pain in the ass” some government stooge has no right to even look at them.

? All servers are located in Switzerland, there is a constant process of improving the technology: adding memory, features.

? You have to enter 2 passwords when logging in (the second password is automatically enabled if you close the tab or put your laptop into “sleep” mode).

? Full control of private keys is in development.

? Encryption of emails – between Proton users, emails are encrypted by default, and when sent to third-party email services, they can be password protected. Then the recipient receives not the body of the email, but a link to Proton’s website where they can enter the password (you share the password with another communication method) and access the content, including attachments.

? If you have lost your password, it cannot be recovered. It is possible to reset the password, but in this case you will permanently lose your e-mails. Don’t forget your passwords!

First, let’s request an “invitation” by clicking “Sign up” on the main page of the service:

Choose which mail you want, then enter your current box, and “Request Invite”. As soon as you are invited (within a month), you will be able to log in to your account.

You must now enter the mailbox password:

What does the mail look like from the inside?

On the left menu, at the top search, your e-mail, “Report a bug”, “Settings”, and “Exit” buttons. You can start by clicking “Settings” and see what’s there.

It is possible to change login-password, password on the box, Alias – i.e. Alias (bottom right), signature, etc. No key management yet, but it is planned in the near future.

There are no built-in themes, it is possible to insert third-party CSS theme code at your own risk. Using encrypted mail implies abandoning some whistles and farts in favor of security.

Now that we have dug into the settings, we can dig into the mailbox. Here everything is standard but there are some advantages. First, everything that is really necessary for good communication and work is located in the menu on the left side. There are the “Compose” button, the incoming, the contact list and the recycle bin, and the number of not all incoming mails, but only the unread ones is shown:


Why such a variety of sorting is needed is not clear, but it is available:

You can also use colored tags to mark emails you need.

And this is what the contact list (without green) looks like:

In general, as a person who has tried almost all popular email services, I can conclude: it is most convenient to work with this mail (especially for connoisseurs of minimalism), and most importantly – safer.


Why does it matter?

This is important for everyone, not only for cryptocurrency users, hackers or advanced programmers. Note that even buying or selling bitcoins today is impossible without using email, and what about the total dependence on email of all Internet services in general, including stores, banks, mobile operators, etc.


In addition, the governmental decisions made in many countries of the world today cannot but put a paranoid mind on guard. To believe that every person in the country is a potential terrorist, drug dealer, or child pornography lover – I’m sorry, I can’t help it…

From the company blog:

“We’d like to close with some thoughts on privacy and surveillance in general. Some people argue that if you are NOT a criminal, there is no need for privacy. To those critics, we’ll just ask the question: does that mean that only criminals have blinders on their windows?”

Why haven’t you used this before?

Although the technology has been around for decades, end-to-end encryption has not been widespread for several reasons. First, it is against the interests of centralized service providers who benefit from advertising and invasion of user privacy to maintain encryption. Second, end-to-end encryption has traditionally been difficult to use, even for technically savvy people. The need for exchanging private and public key in an email service has stalled development. However, the importance of end-to-end encryption will only increase as government technology develops to spy on citizens.

Oh, “terrorists,” I mean.

However, it is worth remembering that unencrypted or not password-protected emails you send to other email services can be intercepted! Paranoid safe internets to you!

Author: Void




free fullz 2021

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *