256-bit AES — the same standard that protects banking transactions

0%
· 5 min read

Email Security: Encryption, Hack Protection, Provider Selection

Updated: March 18, 2025

Email is the center of your digital life. Passwords are reset through email, financial documents arrive, business correspondence is conducted. Email hack = loss of control over all accounts.

Why Email Is Vulnerable

Email Architecture

Email was designed in the 1970s without security in mind:

You → Your Server → Internet → Recipient's Server → Recipient
      [Can read]    [Can read]  [Can read]

Who sees your emails:

  • Your email provider
  • Recipient’s provider
  • Anyone on the path (without TLS)
  • Government agencies (by request)

Typical Threats

ThreatConsequences
Account hackAccess to all emails, password resets
PhishingCredential theft
InterceptionReading correspondence
SpoofingFake emails from your name

Account Protection

Strong Password

  • Unique (not used anywhere else)
  • Long (16+ characters)
  • In password manager

Two-Factor Authentication

Method priority:

  1. Hardware key (YubiKey) - best
  2. TOTP app - good
  3. SMS - only if no other options

Setting up in Gmail:

  1. Google Account → Security
  2. 2-Step Verification
  3. Add Authenticator app
  4. Add backup hardware key

Setting up in Outlook:

  1. account.microsoft.com → Security
  2. Two-step verification
  3. Set up Microsoft Authenticator

Activity Check

Regularly check:

  • Recent account logins
  • Connected applications
  • Forwarding rules (hackers often set these up)
  • Active sessions

Gmail: Scroll down → “Last account activity”

Outlook: Security → View activity


Secure Email Providers

Provider Comparison

ProviderEncryptionPrivacyPrice
ProtonMailE2E by defaultSwitzerland, no logsFree / $48/year
TutanotaE2E by defaultGermany, no logsFree / $36/year
GmailTLS (not E2E)Scans for adsFree
OutlookTLS (not E2E)Scans for adsFree
FastmailTLS (not E2E)Doesn’t scan$50/year

ProtonMail

Pros:

  • End-to-end encryption between ProtonMail users
  • Swiss jurisdiction
  • Open source
  • No access to content even by ProtonMail
  • Built-in VPN (Proton VPN)

Cons:

  • E2E only with other ProtonMail (or via password)
  • Limited storage on free tier
  • No IMAP on free tier

For whom: Journalists, activists, those who value privacy.

Tutanota

Pros:

  • Fully encrypted (including subject line)
  • German jurisdiction
  • Cheaper than ProtonMail
  • Encrypted calendar

Cons:

  • Fewer integrations
  • No PGP support (own system)
  • Less known

For whom: Those wanting a ProtonMail alternative.

When Gmail/Outlook Is Enough

  • Regular correspondence without secrets
  • Business email with colleagues
  • Service notifications

Important: Even on regular email, enable 2FA!


Email Encryption

Encryption Types

TLS (Transport Layer Security):

You ←[Encrypted]→ Server ←[Encrypted]→ Recipient
    [Decrypted on server]

Protects in transit, but server sees content.

E2E (End-to-End):

You ←[Encrypted entire way]→ Recipient
    [Server cannot see content]

Only sender and recipient see the email.

PGP/GPG Encryption

Principle:

  1. Each participant has key pair (public + private)
  2. Encrypt with recipient’s public key
  3. Only their private key can decrypt

How to start:

  1. Install GPG:

    • macOS: brew install gnupg
    • Windows: Gpg4win
    • Linux: usually pre-installed
  2. Create keys:

    gpg --full-generate-key
    
  3. Export public key:

    gpg --armor --export your@email.com > publickey.asc
    
  4. Share public key with contacts

Email integration:

  • Thunderbird: built-in support
  • Apple Mail: GPG Suite
  • Outlook: Gpg4win

PGP Problems

  • Complex for regular users
  • Need to manage keys
  • Metadata not encrypted (who writes to whom)
  • Most contacts don’t use it

Alternative: ProtonMail - PGP under the hood, but simple interface.


Phishing Protection

Phishing Email Signs

SignExample
Urgency”Your account will be blocked!”
Generic greeting”Dear customer” instead of name
Strange addresssupport@amaz0n-security.com
ErrorsGrammar, spelling
Suspicious linksHover - URL doesn’t match
Attachments.exe, .zip from strangers

How to Check

  1. Sender address: Click on name → see real email
  2. Links: Hover cursor (don’t click!) → check URL
  3. Urgency: Real companies don’t threaten instant blocking
  4. When in doubt: Go to site directly, not via email link

Security Settings

Gmail:

  • Enable “Enhanced Safe Browsing”
  • Check Gmail warnings about suspicious emails

Outlook:

  • Enable “Phishing protection”
  • Set up rules for suspicious emails

Email Privacy

What Provider Knows

DataGmailProtonMail
ContentYesNo (E2E)
MetadataYesMinimal
Login IPYesYes (use VPN)
ContactsYesEncrypted

Email Aliases

Use different addresses for different purposes:

Simple way (Gmail):

yourname+shopping@gmail.com
yourname+social@gmail.com
yourname+work@gmail.com

All comes to one inbox, but shows where leak came from.

Advanced way:

  • SimpleLogin - creates unique aliases
  • Firefox Relay - aliases from Mozilla
  • ProtonMail - built-in aliases

What to Do About Trackers

Many emails contain tracking pixels:

  • Open time
  • Location
  • Device

Protection:

  • Disable automatic image loading
  • Use ProtonMail (blocks trackers)
  • PixelBlock extension for Gmail

Email Backup

Why Backup

  • Provider can block account
  • Accidental deletion of important emails
  • Switching to another service
  • Attacks and hacks

Backup Methods

Google Takeout (Gmail):

  1. takeout.google.com
  2. Select Gmail
  3. Export to MBOX

Local client:

  1. Set up IMAP in Thunderbird
  2. Download all emails locally
  3. Sync regularly

Automatic backup:

  • Mailstore Home (free for personal use)
  • imapsync (for technically savvy)

Setting Up Secure Email

Basic Level (any provider)

  1. Strong unique password in password manager
  2. 2FA via app (not SMS)
  3. Activity check monthly
  4. Caution with links and attachments

Advanced Level

  1. Switch to ProtonMail for important correspondence
  2. Email aliases for different services
  3. Disable automatic image loading
  4. Regular backup

Paranoid Level

  1. PGP for all correspondence
  2. Tor for email access
  3. Separate email for each category
  4. Hardware key as only 2FA

Email and VPN

Why VPN for Email

Without VPNWith VPN
ISP knows you’re checking emailSees only VPN traffic
IP logged by email serverVPN IP logged
On public network - interception riskEncryption to VPN

When Especially Important

  • Checking email on public WiFi
  • Hiding the fact of email service usage
  • Accessing email from countries with censorship

Email Security Checklist

Mandatory

  • Unique strong password
  • 2FA via app or key
  • Check suspicious emails before clicking
  • Current backup email/phone
  • ProtonMail or Tutanota for important stuff
  • Email aliases for different services
  • Automatic image loading disabled
  • Regular activity check

For Sensitive Data

  • PGP encryption for correspondence
  • VPN when checking email
  • Regular backup
  • Hardware key for 2FA

Summary

Email remains critically important despite messengers. Minimum - strong password and 2FA on existing email. Optimum - switch to ProtonMail for important correspondence.

Remember: email hack opens access to all your accounts through “Forgot password” feature.

Tainet VPN protects connection when checking email on public networks. Encrypted channel prevents interception of authentication data or email content.