From 96bf4d79294ac4ab34eb359f072b4e73bc345419 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Fri, 21 Mar 2025 21:40:57 -0700 Subject: [PATCH 01/27] style: Reorganize sections of the Email Aliasing page Signed-off-by: redoomed1 --- docs/email-aliasing.md | 42 +++++++++++++++++++++++++----------------- 1 file changed, 25 insertions(+), 17 deletions(-) diff --git a/docs/email-aliasing.md b/docs/email-aliasing.md index a41d3053..e15f27e6 100644 --- a/docs/email-aliasing.md +++ b/docs/email-aliasing.md @@ -9,17 +9,14 @@ cover: email-aliasing.webp - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } - [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information){ .pg-green } -An **email aliasing service** allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your [email provider](email.md). True email aliasing is better than plus addressing commonly used and supported by many providers, which allows you to create aliases like `yourname+[anythinghere]@example.com`, because websites, advertisers, and tracking networks can trivially remove anything after the `+` sign. Organizations like the [IAB](https://en.wikipedia.org/wiki/Interactive_Advertising_Bureau) require that advertisers [normalize email addresses](https://shkspr.mobi/blog/2023/01/the-iab-loves-tracking-users-but-it-hates-users-tracking-them) so that they can be correlated and tracked, regardless of users' privacy wishes. +An **email aliasing service** allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your [email provider](email.md). -
- -- ![addy.io logo](assets/img/email-aliasing/addy.svg){ .twemoji } [addy.io](email-aliasing.md#addyio) -- ![SimpleLogin logo](assets/img/email-aliasing/simplelogin.svg){ .twemoji } [SimpleLogin](email-aliasing.md#simplelogin) - -
+True email aliasing is better than plus addressing commonly used and supported by many providers, which allows you to create aliases like `yourname+[anythinghere]@example.com`, because websites, advertisers, and tracking networks can trivially remove anything after the `+` sign. Organizations like the [IAB](https://en.wikipedia.org/wiki/Interactive_Advertising_Bureau) require that advertisers [normalize email addresses](https://shkspr.mobi/blog/2023/01/the-iab-loves-tracking-users-but-it-hates-users-tracking-them) so that they can be correlated and tracked, regardless of users' privacy wishes. Email aliasing can also act as a safeguard in case your email provider ever ceases operation. In that scenario, you can easily re-route your aliases to a new email address. In turn, however, you are placing trust in the aliasing service to continue functioning. +## Benefits over Conventional Email Filtering Methods + Using a dedicated email aliasing service also has a number of benefits over a catch-all alias on a custom domain: - Aliases can be turned on and off individually when you need them, preventing websites from emailing you randomly. @@ -31,7 +28,16 @@ They also have a number of benefits over "temporary email" services: - Emails are sent to your trusted mailbox rather than stored by the alias provider. - Temporary email services typically have public mailboxes which can be accessed by anyone who knows the address, while aliases are private to you. -Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as on your own custom domain(s) for a modest yearly fee. They can also be self-hosted if you want maximum control. However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the at (@) sign. +## Recommended Providers + +
+ +- ![addy.io logo](assets/img/email-aliasing/addy.svg){ .twemoji } [addy.io](email-aliasing.md#addyio) +- ![SimpleLogin logo](assets/img/email-aliasing/simplelogin.svg){ .twemoji } [SimpleLogin](email-aliasing.md#simplelogin) + +
+ +Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as on your own custom domain(s) for a modest yearly fee. They can also be self-hosted if you want maximum control. However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the at symbol (@). Using an aliasing service requires trusting both your email provider and your aliasing provider with your unencrypted messages. Some providers mitigate this slightly with automatic PGP encryption[^1], which reduces the number of parties you need to trust from two to one by encrypting incoming emails before they are delivered to your final mailbox provider. @@ -45,7 +51,7 @@ Using an aliasing service requires trusting both your email provider and your al [:octicons-home-16: Homepage](https://addy.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://addy.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://addy.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://addy.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/anonaddy){ .card-link title="Source Code" } [:octicons-heart-16:](https://addy.io/donate){ .card-link title=Contribute } @@ -55,7 +61,7 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/iadbdpnoknmbdeolbapdackdcogdmjpe) @@ -63,7 +69,9 @@ Using an aliasing service requires trusting both your email provider and your al The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can pay for these plans using [cryptocurrency](https://addy.io/help/subscribing-with-cryptocurrency) or purchase a voucher code from [ProxyStore](https://addy.io/help/voucher-codes), addy.io's official reseller. -You can create unlimited standard aliases which end in a domain like @[username].addy.io or a custom domain on paid plans. However, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +You can create unlimited standard aliases which end in a domain like `@[username].addy.io` or a custom domain on paid plans. However, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. + +Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -85,7 +93,7 @@ If you cancel your subscription, you will still enjoy the features of your paid [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -96,18 +104,18 @@ If you cancel your subscription, you will still enjoy the features of your paid - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) -- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/diacfpipniklenphgljfkmhinphjlfff) - [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. -You can link your SimpleLogin account in the settings with your Proton account. If you have Proton Pass Plus, Proton Unlimited, or any multi-user Proton plan, you will have SimpleLogin Premium for free. +You can link your SimpleLogin account in the settings with your Proton account. If you have Proton Pass Plus, Proton Unlimited, or any multi-user Proton plan, you will have SimpleLogin Premium for free. You can also purchase a voucher code for SimpleLogin Premium anonymously via their official reseller [ProxyStore](https://simplelogin.io/faq). -You can also purchase a voucher code for SimpleLogin Premium anonymously via their official reseller, [ProxyStore](https://simplelogin.io/faq). +Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Notable free features: @@ -120,6 +128,6 @@ When your subscription ends, all aliases you created will still be able to recei ## Criteria -**Please note we are not affiliated with any of the providers we recommend.** In addition to [our standard criteria](about/criteria.md), we evaluate email aliasing providers to the same standard as our regular [email provider criteria](email.md#criteria) where applicable. We suggest you familiarize yourself with this list before choosing an email service, and conduct your own research to ensure the provider you choose is the right choice for you. +**Please note we are not affiliated with any of the providers we recommend.** In addition to [our standard criteria](about/criteria.md), we evaluate email aliasing providers to the same standard as our regular [email provider criteria](email.md#criteria) where applicable. We suggest you familiarize yourself with this list before choosing an email aliasing service, and conduct your own research to ensure the provider you choose is the right choice for you. [^1]: Automatic PGP encryption allows you to encrypt non-encrypted incoming emails before they are forwarded to your mailbox, making sure your primary mailbox provider never sees unencrypted email content. From 80f716c1e475d3c084b745ea78ccc5d5e10b1b00 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Fri, 21 Mar 2025 21:41:42 -0700 Subject: [PATCH 02/27] update: Internal link to point to new section Signed-off-by: redoomed1 --- docs/email.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/email.md b/docs/email.md index c546f892..96b29da4 100644 --- a/docs/email.md +++ b/docs/email.md @@ -25,7 +25,7 @@ For everything else, we recommend a variety of email providers based on sustaina | [Mailbox.org](#mailboxorg) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | Cash | | [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero & Cash via third-party | -In addition to (or instead of) an email provider recommended here, you may wish to consider a dedicated [email aliasing service](email-aliasing.md) to protect your privacy. Among other things, these services can help protect your real inbox from spam, prevent marketers from correlating your accounts, and encrypt all incoming messages with PGP. +In addition to (or instead of) an email provider recommended here, you may wish to consider a dedicated [email aliasing service](email-aliasing.md#recommended-providers) to protect your privacy. Among other things, these services can help protect your real inbox from spam, prevent marketers from correlating your accounts, and encrypt all incoming messages with PGP. - [More Information :material-arrow-right-drop-circle:](email-aliasing.md) From 847405eba973d47f20b764687d24f67cba3f9be5 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Fri, 21 Mar 2025 21:53:01 -0700 Subject: [PATCH 03/27] style: Remove unnecessary word Signed-off-by: redoomed1 --- docs/email-aliasing.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/email-aliasing.md b/docs/email-aliasing.md index e15f27e6..a1934fe9 100644 --- a/docs/email-aliasing.md +++ b/docs/email-aliasing.md @@ -37,7 +37,7 @@ They also have a number of benefits over "temporary email" services: -Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as on your own custom domain(s) for a modest yearly fee. They can also be self-hosted if you want maximum control. However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the at symbol (@). +Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as on your own custom domain(s) for a modest yearly fee. They can also be self-hosted if you want maximum control. However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the `@` symbol. Using an aliasing service requires trusting both your email provider and your aliasing provider with your unencrypted messages. Some providers mitigate this slightly with automatic PGP encryption[^1], which reduces the number of parties you need to trust from two to one by encrypting incoming emails before they are delivered to your final mailbox provider. From b36be75598a1de5f8b9796a50d36ceb7ed6e8482 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 07:52:31 -0700 Subject: [PATCH 04/27] style: Clean up some sections Signed-off-by: redoomed1 --- docs/email-aliasing.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/email-aliasing.md b/docs/email-aliasing.md index a1934fe9..91d69bc9 100644 --- a/docs/email-aliasing.md +++ b/docs/email-aliasing.md @@ -17,12 +17,12 @@ Email aliasing can also act as a safeguard in case your email provider ever ceas ## Benefits over Conventional Email Filtering Methods -Using a dedicated email aliasing service also has a number of benefits over a catch-all alias on a custom domain: +Using a dedicated email aliasing service has a number of benefits over a catch-all alias on a custom domain: - Aliases can be turned on and off individually when you need them, preventing websites from emailing you randomly. - Replies are sent from the alias address, shielding your real email address. -They also have a number of benefits over "temporary email" services: +Email aliasing services also have a number of benefits over "temporary email" services: - Aliases are permanent and can be turned on again if you need to receive something like a password reset. - Emails are sent to your trusted mailbox rather than stored by the alias provider. @@ -47,7 +47,7 @@ Using an aliasing service requires trusting both your email provider and your al ![addy.io logo](assets/img/email-aliasing/addy.svg){ align=right } -**addy.io** lets you create 10 domain aliases on a shared domain for free, or unlimited "standard" aliases. +**addy.io** lets you create 10 domain aliases on a shared domain for free, or unlimited ["standard" aliases](https://addy.io/faq/#what-is-a-standard-alias). [:octicons-home-16: Homepage](https://addy.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://addy.io/privacy){ .card-link title="Privacy Policy" } @@ -67,7 +67,7 @@ Using an aliasing service requires trusting both your email provider and your al -The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can pay for these plans using [cryptocurrency](https://addy.io/help/subscribing-with-cryptocurrency) or purchase a voucher code from [ProxyStore](https://addy.io/help/voucher-codes), addy.io's official reseller. +The number of shared aliases (which end in a shared domain like @addy.io) that you can create depends on the [plan](https://addy.io/#pricing) you are subscribed to. You can pay for these plans using [cryptocurrency](https://addy.io/help/subscribing-with-cryptocurrency) or purchase a voucher code from [ProxyStore](https://addy.io/help/voucher-codes), addy.io's official reseller. You can create unlimited standard aliases which end in a domain like `@[username].addy.io` or a custom domain on paid plans. However, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. From 37ffd0c55b8e9089f87292a66abf52832476a86c Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 09:19:23 -0700 Subject: [PATCH 05/27] style: Add line break Signed-off-by: redoomed1 --- docs/email.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/email.md b/docs/email.md index 96b29da4..f386dcb3 100644 --- a/docs/email.md +++ b/docs/email.md @@ -23,7 +23,7 @@ For everything else, we recommend a variety of email providers based on sustaina |---|---|---|---|---| | [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Paid plans only | :material-check:{ .pg-green } | Cash | | [Mailbox.org](#mailboxorg) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | Cash | -| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero & Cash via third-party | +| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero
Cash via third party | In addition to (or instead of) an email provider recommended here, you may wish to consider a dedicated [email aliasing service](email-aliasing.md#recommended-providers) to protect your privacy. Among other things, these services can help protect your real inbox from spam, prevent marketers from correlating your accounts, and encrypt all incoming messages with PGP. From 1ccc085aaf1250a6e66753b0de18c405255c1aa2 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 09:25:58 -0700 Subject: [PATCH 06/27] update: Replace docs link with links to official Addy.io mobile apps Signed-off-by: redoomed1 --- docs/email-aliasing.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/email-aliasing.md b/docs/email-aliasing.md index 91d69bc9..c8834f42 100644 --- a/docs/email-aliasing.md +++ b/docs/email-aliasing.md @@ -58,8 +58,8 @@ Using an aliasing service requires trusting both your email provider and your al
Downloads -- [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) -- [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=host.stjin.anonaddy) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6563138633) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/iadbdpnoknmbdeolbapdackdcogdmjpe) From 4b8053143e6a36b69148afcc10c4312ceb9570f9 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 10:09:59 -0700 Subject: [PATCH 07/27] style: Improvements to the Email Services page Signed-off-by: redoomed1 --- docs/email.md | 106 +++++++++++++++++++++++++------------------------- 1 file changed, 53 insertions(+), 53 deletions(-) diff --git a/docs/email.md b/docs/email.md index f386dcb3..61ac6d4a 100644 --- a/docs/email.md +++ b/docs/email.md @@ -19,7 +19,7 @@ Email is practically a necessity for using any online service, however we do not For everything else, we recommend a variety of email providers based on sustainable business models and built-in security and privacy features. Read our [full list of criteria](#criteria) for more information. -| Provider | OpenPGP / WKD | IMAP / SMTP | Zero Access Encryption | Anonymous Payments | +| Provider | OpenPGP / WKD | IMAP / SMTP | Zero-access Encryption | Anonymous Payment Methods | |---|---|---|---|---| | [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Paid plans only | :material-check:{ .pg-green } | Cash | | [Mailbox.org](#mailboxorg) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | Cash | @@ -31,7 +31,7 @@ In addition to (or instead of) an email provider recommended here, you may wish ## OpenPGP Compatible Services -These providers natively support OpenPGP encryption/decryption and the [Web Key Directory standard](basics/email-security.md#what-is-the-web-key-directory-standard), allowing for provider-agnostic E2EE emails. For example, a Proton Mail user could send an E2EE message to a Mailbox.org user, or you could receive OpenPGP-encrypted notifications from internet services which support it. +These providers natively support OpenPGP encryption/decryption and the [Web Key Directory (WKD) standard](basics/email-security.md#what-is-the-web-key-directory-standard), allowing for provider-agnostic end-to-end encrypted emails. For example, a Proton Mail user could send an E2EE message to a Mailbox.org user, or you could receive OpenPGP-encrypted notifications from internet services which support it.
@@ -45,7 +45,9 @@ These providers natively support OpenPGP encryption/decryption and the [Web Key When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview). -OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys) +OpenPGP also does not support forward secrecy, which means if either the private key of you or the message recipient is ever stolen, all previous messages encrypted with it will be exposed. + +- [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys)
@@ -55,7 +57,9 @@ OpenPGP also does not support Forward secrecy, which means if either your or the ![Proton Mail logo](assets/img/email/protonmail.svg){ align=right } -**Proton Mail** is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. +**Proton Mail** is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. + +The Proton Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. [:octicons-home-16: Homepage](https://proton.me/mail){ .md-button .md-button--primary } [:simple-torbrowser:](https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion){ .card-link title="Onion Service" } @@ -78,9 +82,9 @@ OpenPGP also does not support Forward secrecy, which means if either your or the -Free accounts have some limitations, such as not being able to search body text and not having access to [Proton Mail Bridge](https://proton.me/mail/bridge), which is required to use a [recommended desktop email client](email-clients.md) (e.g. Thunderbird). Paid accounts include features like Proton Mail Bridge, additional storage, and custom domain support. A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton Mail's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +Free accounts have some limitations, such as not being able to search body text and not having access to [Proton Mail Bridge](https://proton.me/mail/bridge), which is required to use a [recommended desktop email client](email-clients.md) (e.g., Thunderbird). Paid accounts include features like Proton Mail Bridge, additional storage, and custom domain support. If you have the Proton Unlimited plan or any multi-user Proton plan, you also get [SimpleLogin](email-aliasing.md#simplelogin) Premium for free. -If you have the Proton Unlimited plan or any multi-user Proton plan, you also get [SimpleLogin](email-aliasing.md#simplelogin) Premium for free. +A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton Mail's apps on 9th November 2021 by [Securitum](https://research.securitum.com). Proton Mail has internal crash reports that are **not** shared with third parties. This can be disabled in the web app: :gear: → **All Settings** → **Account** → **Security and privacy** → **Privacy and data collection**. @@ -90,7 +94,7 @@ Paid Proton Mail subscribers can use their own domain with the service or a [cat #### :material-check:{ .pg-green } Private Payment Methods -Proton Mail [accepts](https://proton.me/support/payment-options) cash by mail in addition to standard credit/debit card, [Bitcoin](advanced/payments.md#other-coins-bitcoin-ethereum-etc), and PayPal payments. +Proton Mail [accepts](https://proton.me/support/payment-options) **cash** by mail in addition to standard credit/debit card, [Bitcoin](advanced/payments.md#other-coins-bitcoin-ethereum-etc), and PayPal payments. #### :material-check:{ .pg-green } Account Security @@ -106,7 +110,7 @@ Certain information stored in [Proton Contacts](https://proton.me/support/proton Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. Proton also supports automatic external key discovery with [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This means that emails sent to other providers which use WKD will be automatically encrypted with OpenPGP as well, without the need to manually exchange public PGP keys with your contacts. They also allow you to [encrypt messages to non-Proton Mail addresses without OpenPGP](https://proton.me/support/password-protected-emails), without the need for them to sign up for a Proton Mail account. -Proton Mail also publishes the public keys of Proton accounts via HTTP from their WKD. This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Proton's own domains, like @proton.me. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. +Proton Mail also publishes the public keys of Proton accounts via HTTP from their WKD. This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Proton's own domains, like `@proton.me`. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately. #### :material-information-outline:{ .pg-blue } Account Termination @@ -116,15 +120,15 @@ If you have a paid account and your [bill is unpaid](https://proton.me/support/d Proton Mail's [Unlimited](https://proton.me/support/proton-plans#proton-unlimited) plan also enables access to other Proton services in addition to providing multiple custom domains, unlimited hide-my-email aliases, and 500 GB of storage. -Proton Mail doesn't offer a digital legacy feature. - ### Mailbox.org
![Mailbox.org logo](assets/img/email/mailboxorg.svg){ align=right } -**Mailbox.org** is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. +**Mailbox.org** is an email service with a focus on being secure, ad-free, and powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. + +Accounts start with up to 2 GB storage, which can be upgraded as needed. [:octicons-home-16: Homepage](https://mailbox.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Privacy Policy" } @@ -145,23 +149,23 @@ Mailbox.org lets you use your own domain, and they support [catch-all](https://k #### :material-check:{ .pg-green } Private Payment Methods -Mailbox.org doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and a couple of German-specific processors: paydirekt and Sofortüberweisung. +Mailbox.org doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept **cash** by mail, **cash** payment to bank account, bank transfer, credit card, PayPal, and a couple of German-specific processors: Paydirekt and Sofortüberweisung. #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two-factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two-factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that data. #### :material-check:{ .pg-green } Email Encryption Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. -Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. +Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately. #### :material-information-outline:{ .pg-blue } Account Termination @@ -173,7 +177,7 @@ You can access your Mailbox.org account via IMAP/SMTP using their [.onion servic All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. -Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. +Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs, providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. ## More Providers @@ -192,7 +196,9 @@ These providers store your emails with zero-knowledge encryption, making them gr ![Tuta logo](assets/img/email/tuta.svg#only-light){ align=right } ![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ align=right } -**Tuta** (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. +**Tuta** (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. + +Free accounts start with 1 GB of storage. [:octicons-home-16: Homepage](https://tuta.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } @@ -223,7 +229,7 @@ Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and u #### :material-information-outline:{ .pg-blue } Private Payment Methods -Tuta only directly accepts credit cards and PayPal, however [cryptocurrency](cryptocurrency.md) can be used to purchase gift cards via their [partnership](https://tuta.com/support/#cryptocurrency) with ProxyStore. +Tuta only directly accepts credit cards and PayPal, however [**cryptocurrency**](cryptocurrency.md) can be used to purchase gift cards via their [partnership](https://tuta.com/support/#cryptocurrency) with ProxyStore. #### :material-check:{ .pg-green } Account Security @@ -231,7 +237,7 @@ Tuta supports [two-factor authentication](https://tuta.com/support#2fa) with eit #### :material-check:{ .pg-green } Data Security -Tuta has [zero access encryption at rest](https://tuta.com/support#what-encrypted) for your emails, [address book contacts](https://tuta.com/support#encrypted-address-book), and [calendars](https://tuta.com/support#calendar). This means the messages and other data stored in your account are only readable by you. +Tuta has [zero-access encryption at rest](https://tuta.com/support#what-encrypted) for your emails, [address book contacts](https://tuta.com/support#encrypted-address-book), and [calendars](https://tuta.com/support#calendar). This means the messages and other data stored in your account are only readable by you. #### :material-information-outline:{ .pg-blue } Email Encryption @@ -245,8 +251,6 @@ Tuta will [delete inactive free accounts](https://tuta.com/support#inactive-acco Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/secure-email-for-non-profit) for free or with a heavy discount. -Tuta doesn't offer a digital legacy feature. - ## Self-Hosting Email Advanced system administrators may consider setting up their own email server. Mail servers require attention and continuous maintenance in order to keep things secure and mail delivery reliable. In addition to the "all-in-one" solutions below, we've picked out a few articles that cover a more manual approach: @@ -312,22 +316,21 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** -- Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .EML with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. +- Must encrypt email account data at rest with zero-access encryption. +- Must be capable of exporting emails as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .EML with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. -- Operates on owned infrastructure, i.e. not built upon third-party email service providers. +- Must operate on owned infrastructure, i.e. not built upon third-party email service providers. **Best Case:** -- Encrypts all account data (Contacts, Calendars, etc.) at rest with zero-access encryption. -- Integrated webmail E2EE/PGP encryption provided as a convenience. -- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. - GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` +- Should encrypt all account data (contacts, calendars, etc.) at rest with zero-access encryption. +- Should provide integrated webmail E2EE/PGP encryption as a convenience. +- Should support [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. -- Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. +- Should support [sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing). - Catch-all or alias functionality for those who use their own domains. -- Use of standard email access protocols such as IMAP, SMTP, or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. +- Should use standard email access protocols such as IMAP, SMTP, or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. +- Email provider's services should be available via an [onion service](https://en.wikipedia.org/wiki/.onion). ### Privacy @@ -335,30 +338,30 @@ We prefer our recommended providers to collect as little data as possible. **Minimum to Qualify:** -- Protect sender's IP address, which can involve filtering it from showing in the `Received` header field. -- Don't require personally identifiable information (PII) besides a username and a password. -- Privacy policy that meets the requirements defined by the GDPR. +- Must protect sender's IP address, which can involve filtering it from showing in the `Received` header field. +- Must not require personally identifiable information (PII) besides a username and a password. +- Privacy policy must meet the requirements defined by the GDPR. **Best Case:** -- Accepts [anonymous payment options](advanced/payments.md) ([cryptocurrency](cryptocurrency.md), cash, gift cards, etc.) -- Hosted in a jurisdiction with strong email privacy protection laws. +- Should accept [anonymous payment options](advanced/payments.md) ([cryptocurrency](cryptocurrency.md), cash, gift cards, etc.) +- Should be hosted in a jurisdiction with strong email privacy protection laws. ### Security -Email servers deal with a lot of very sensitive data. We expect that providers will adopt best industry practices in order to protect their customers. +Email servers deal with a lot of very sensitive data. We expect that providers will adopt industry best practices in order to protect their customers. **Minimum to Qualify:** -- Protection of webmail with 2FA, such as TOTP. -- Zero access encryption, which builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. +- Protection of webmail with 2FA, such as [TOTP](basics/multi-factor-authentication.md#time-based-one-time-password-totp). +- Zero-access encryption, which builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. - No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). -- A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. +- A server suite preference (optional on TLS 1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. -- Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. +- Must have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. - A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: @@ -368,10 +371,10 @@ Email servers deal with a lot of very sensitive data. We expect that providers w **Best Case:** -- Support for hardware authentication, i.e. U2F and [WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online). +- Should support hardware authentication, i.e. U2F and [WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online). - [DNS Certification Authority Authorization (CAA) Resource Record](https://tools.ietf.org/html/rfc6844) in addition to DANE support. -- Implementation of [Authenticated Received Chain (ARC)](https://en.wikipedia.org/wiki/Authenticated_Received_Chain), which is useful for people who post to mailing lists [RFC8617](https://tools.ietf.org/html/rfc8617). -- Published security audits from a reputable third-party firm. +- Should implement [Authenticated Received Chain (ARC)](https://en.wikipedia.org/wiki/Authenticated_Received_Chain), which is useful for people who post to mailing lists [RFC8617](https://tools.ietf.org/html/rfc8617). +- Published security audits from a reputable, third-party firm. - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) @@ -396,18 +399,15 @@ With the email providers we recommend, we like to see responsible marketing. **Minimum to Qualify:** - Must self-host analytics (no Google Analytics, Adobe Analytics, etc.). - -Must not have any irresponsible marketing, which can include the following: - -- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it. -- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily de-anonymize themselves in a number of ways, e.g.: - - - Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.) - - [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint) +- Must not have any irresponsible marketing, which can include the following: + - Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it. + - Guarantees of protecting anonymity 100%. When someone makes a claim that something is 100%, it means there is no certainty for failure. We know people can quite easily de-anonymize themselves in a number of ways, e.g.: + - Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software such as Tor + - [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint) **Best Case:** -- Clear and easy to read documentation for tasks like setting up 2FA, email clients, OpenPGP, etc. +- Clear and easy-to-read documentation for tasks like setting up 2FA, email clients, OpenPGP, etc. ### Additional Functionality From a9eaf31b7ebe16163c6cfc46a76c526a30e71545 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 11:35:34 -0700 Subject: [PATCH 08/27] update: Add WKD to abbreviations list and clean up page Signed-off-by: redoomed1 --- includes/abbreviations.en.txt | 45 +++++++++++++++++++---------------- 1 file changed, 24 insertions(+), 21 deletions(-) diff --git a/includes/abbreviations.en.txt b/includes/abbreviations.en.txt index 4d2f9ada..270bf1b5 100644 --- a/includes/abbreviations.en.txt +++ b/includes/abbreviations.en.txt @@ -2,42 +2,42 @@ *[ADB]: Android Debug Bridge *[AOSP]: Android Open Source Project *[ATA]: Advanced Technology Attachment -*[attack surface]: The total number of possible entry points for unauthorized access to a system +*[attack surface]: The total number of possible entry points for unauthorized access to a system. *[AVB]: Android Verified Boot *[cgroups]: Control Groups *[CLI]: Command Line Interface *[CSV]: Comma-Separated Values *[CVE]: Common Vulnerabilities and Exposures -*[dark pattern]: A deceptive design pattern intended to trick a user into doing things -*[digital legacy feature]: Digital Legacy refers to features that allow you to give other people access to your data when you die +*[dark pattern]: A deceptive design pattern intended to trick a user into taking certain actions. +*[digital legacy feature]: Digital legacy refers to features that allow you to give other people access to your data when you die. *[DNSSEC]: Domain Name System Security Extensions *[DNS]: Domain Name System *[DoH]: DNS over HTTPS *[DoQ]: DNS over QUIC *[DoH3]: DNS over HTTP/3 *[DoT]: DNS over TLS -*[DPI]: Deep Packet Inspection identifies and blocks packet with specific payloads +*[DPI]: Deep Packet Inspection *[E2EE]: End-to-End Encryption/Encrypted *[ECS]: EDNS Client Subnet *[EEA]: European Economic Area -*[entropy]: A measurement of how unpredictable something is +*[entropy]: A measurement of how unpredictable something is. *[EOL]: End-of-Life *[Exif]: Exchangeable image file format *[FCM]: Firebase Cloud Messaging *[FDE]: Full Disk Encryption *[FIDO]: Fast IDentity Online *[FS]: Forward Secrecy -*[fork]: A new software project created by copying an existing project and adding to it independently +*[fork]: A new software project created by copying an existing project and adding to it independently. *[GDPR]: General Data Protection Regulation *[GPG]: GNU Privacy Guard (PGP implementation) *[GPS]: Global Positioning System *[GUI]: Graphical User Interface *[GnuPG]: GNU Privacy Guard (PGP implementation) *[HDD]: Hard Disk Drive -*[HOTP]: HMAC (Hash-based Message Authentication Code) based One-Time Password +*[HOTP]: HMAC (Hash-based Message Authentication Code) -based One-Time Password *[HTTPS]: Hypertext Transfer Protocol Secure *[HTTP]: Hypertext Transfer Protocol -*[hypervisor]: Computer software, firmware, or hardware that splits the resources of a CPU among multiple operating systems +*[hypervisor]: Computer software, firmware, or hardware that splits the resources of a CPU among multiple operating systems. *[ICCID]: Integrated Circuit Card Identifier *[IMAP]: Internet Message Access Protocol *[IMEI]: International Mobile Equipment Identity @@ -50,21 +50,22 @@ *[JNI]: Java Native Interface *[KYC]: Know Your Customer *[LLaVA]: Large Language and Vision Assistant (multimodal AI model) +*[LLM]: Large Language Model (AI model such as ChatGPT) *[LLMs]: Large Language Models (AI models such as ChatGPT) -*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption) +*[LUKS]: Linux Unified Key Setup (full disk encryption) *[MAC]: Media Access Control *[MDAG]: Microsoft Defender Application Guard *[MEID]: Mobile Equipment Identifier *[MFA]: Multi-Factor Authentication -*[NVMe]: Nonvolatile Memory Express -*[NAT]: Network address translation -*[NAT-PMP]: NAT Port Mapping Protocol +*[NVMe]: Non-Volatile Memory Express +*[NAT]: Network Address Translation +*[NAT-PMP]: NAT (Network Address Translation) Port Mapping Protocol *[NTP]: Network Time Protocol *[OCI]: Open Container Initiative *[OCSP]: Online Certificate Status Protocol *[OEM]: Original Equipment Manufacturer *[OEMs]: Original Equipment Manufacturers -*[open-weights]: An open weights-model is an AI model that anyone can download and use, but for which the underlying training data and/or algorithms are proprietary. +*[open-weights model]: An AI model that anyone can download and use, but the underlying training data and/or algorithms for it are proprietary. *[OS]: Operating System *[OTP]: One-Time Password *[OTPs]: One-Time Passwords @@ -72,12 +73,12 @@ *[P2P]: Peer-to-Peer *[PAM]: Linux Pluggable Authentication Modules *[POP3]: Post Office Protocol 3 -*[PGP]: Pretty Good Privacy (see OpenPGP) +*[PGP]: Pretty Good Privacy *[PII]: Personally Identifiable Information *[QNAME]: Qualified Name -*[QUIC]: A network protocol based on UDP, but aiming to combine the speed of UDP with the reliability of TCP. +*[QUIC]: A network protocol that is based on UDP, but aims to combine the speed of UDP with the reliability of TCP. *[rate limits]: Rate limits are restrictions that a service imposes on the number of times a user can access their services within a specified period of time. -*[rolling release]: Updates which are released frequently rather than set intervals +*[rolling release]: Updates which are released frequently rather than at set intervals. *[RSS]: Really Simple Syndication *[SELinux]: Security-Enhanced Linux *[SIM]: Subscriber Identity Module @@ -86,17 +87,17 @@ *[SNI]: Server Name Indication *[SSD]: Solid-State Drive *[SSH]: Secure Shell -*[SUID]: Set Owner User ID +*[SUID]: Set User Identity *[SaaS]: Software as a Service (cloud software) *[SoC]: System on Chip -*[SSO]: Single sign-on -*[system prompt]: The system prompt of an AI chat is the general instructions given by a human to guide how it should operate. -*[temperature]: AI temperature is a parameter used in AI models to control the level of randomness and creativity in the generated text. +*[SSO]: Single Sign-On +*[system prompt]: The general instructions given by a human to guide how an AI chat should operate. +*[temperature]: A parameter used in AI models to control the level of randomness and creativity in the generated text. *[TCP]: Transmission Control Protocol *[TEE]: Trusted Execution Environment *[TLS]: Transport Layer Security *[ToS]: Terms of Service -*[TOTP]: Time-based One-Time Password +*[TOTP]: Time-Based One-Time Password *[TPM]: Trusted Platform Module *[U2F]: Universal 2nd Factor *[UEFI]: Unified Extensible Firmware Interface @@ -105,5 +106,7 @@ *[VLAN]: Virtual Local Area Network *[VoIP]: Voice over IP (Internet Protocol) *[W3C]: World Wide Web Consortium +*[WKD] Web Key Directory *[XMPP]: Extensible Messaging and Presence Protocol *[PWA]: Progressive Web App +*[PWAs]: Progressive Web Apps From 019e5fca785a43dbec3a015d4197e05bb7343535 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 14:48:10 -0700 Subject: [PATCH 09/27] style: Remove unnecessary comma Signed-off-by: redoomed1 --- docs/email.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/email.md b/docs/email.md index 61ac6d4a..56edeacb 100644 --- a/docs/email.md +++ b/docs/email.md @@ -326,7 +326,7 @@ We regard these features as important in order to provide a safe and optimal ser - Should encrypt all account data (contacts, calendars, etc.) at rest with zero-access encryption. - Should provide integrated webmail E2EE/PGP encryption as a convenience. - Should support [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` -- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. +- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Should support [sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing). - Catch-all or alias functionality for those who use their own domains. - Should use standard email access protocols such as IMAP, SMTP, or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. From efd225f4351b18f0a9646911f999515158b9e5ce Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:10:22 -0700 Subject: [PATCH 10/27] update: Embed Wikipedia article about WKD and make other style changes Signed-off-by: redoomed1 --- docs/basics/email-security.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/docs/basics/email-security.md b/docs/basics/email-security.md index 60513510..59dd33c2 100644 --- a/docs/basics/email-security.md +++ b/docs/basics/email-security.md @@ -5,31 +5,31 @@ icon: material/email description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications. --- -Email is an insecure form of communication by default. You can improve your email security with tools such as OpenPGP, which add End-to-End Encryption to your messages, but OpenPGP still has a number of drawbacks compared to encryption in other messaging applications, and some email data can never be encrypted inherently due to how email is designed. +Email is an insecure form of communication by default. You can improve your email security with tools such as OpenPGP, which add end-to-end encryption to your messages, but OpenPGP still has a number of drawbacks compared to encryption in other messaging applications, and some email data can never be encrypted inherently due to how email is designed. As a result, email is best used for receiving transactional emails (like notifications, verification emails, password resets, etc.) from the services you sign up for online, not for communicating with others. ## Email Encryption Overview -The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). +The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](../encryption.md#gnu-privacy-guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with businesses called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [certificate authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). -Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. +Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if the private key of either you or the message recipient is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. ## What is the Web Key Directory standard? -The Web Key Directory (WKD) standard allows email clients to discover the OpenPGP key for other mailboxes, even those hosted on a different provider. Email clients which support WKD will ask the recipient's server for a key based on the email address' domain name. For example, if you emailed `jonah@privacyguides.org`, your email client would ask `privacyguides.org` for Jonah's OpenPGP key, and if `privacyguides.org` has a key for that account, your message would be automatically encrypted. +The [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD) standard allows email clients to discover the OpenPGP key for other mailboxes, even those hosted on a different provider. Email clients which support WKD will ask the recipient's server for a key based on the email address' domain name. For example, if you emailed `jonah@privacyguides.org`, your email client would ask `privacyguides.org` for Jonah's OpenPGP key, and if `privacyguides.org` has a key for that account, your message would be automatically encrypted. In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from the `keys.openpgp.org` server: Set a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then upload your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). -If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. +If you use a shared domain from a provider which doesn't support WKD, like `@gmail.com`, you won't be able to share your OpenPGP key with others via this method. ### What Email Clients Support E2EE? -Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the [email clients we recommend](../email-clients.md). Depending on the authentication method, this may lead to the decrease security if either the provider or the email client does not support OATH or a bridge application as [multifactor authentication](multi-factor-authentication.md) is not possible with plain password authentication. +Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the [email clients we recommend](../email-clients.md). Depending on the authentication method, this may lead to decreased security if either the provider or the email client does not support OAuth or a bridge application as [multifactor authentication](multi-factor-authentication.md) is not possible with plain password authentication. ### How Do I Protect My Private Keys? @@ -39,14 +39,14 @@ It is advantageous for the decryption to occur on the smart card to avoid possib ## Email Metadata Overview -Email metadata is stored in the [message header](https://en.wikipedia.org/wiki/Email#Message_header) of the email message and includes some visible headers that you may have seen such as: `To`, `From`, `Cc`, `Date`, `Subject`. There are also a number of hidden headers included by many email clients and providers that can reveal information about your account. +Email metadata is stored in the [message header](https://en.wikipedia.org/wiki/Email#Message_header) of the email message and includes some visible headers that you may have seen such as `To`, `From`, `Cc`, `Date`, and `Subject`. There are also a number of hidden headers included by many email clients and providers that can reveal information about your account. Client software may use email metadata to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among [other purposes](https://en.wikipedia.org/wiki/Email#Message_header) which are not always transparent. ### Who Can View Email Metadata? -Email metadata is protected from outside observers with [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) protecting it from outside observers, but it is still able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients including your email provider. Sometimes email servers will also use third-party services to protect against spam, which generally also have access to your messages. +Email metadata is protected from outside observers with [opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS), but it is still able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients including your email provider. Sometimes email servers will also use third-party services to protect against spam, which generally also have access to your messages. ### Why Can't Metadata be E2EE? -Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as whom you're emailing, the subject lines, when you're emailing, etc. +Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as whom you're emailing, when you're emailing, the subject lines, etc. From 2fcab1e625bb228b292b92e1b983e334a045629a Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:11:17 -0700 Subject: [PATCH 11/27] style: Add qualifier Signed-off-by: redoomed1 --- docs/basics/email-security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/basics/email-security.md b/docs/basics/email-security.md index 59dd33c2..ae211ca9 100644 --- a/docs/basics/email-security.md +++ b/docs/basics/email-security.md @@ -49,4 +49,4 @@ Email metadata is protected from outside observers with [opportunistic TLS](http ### Why Can't Metadata be E2EE? -Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as whom you're emailing, when you're emailing, the subject lines, etc. +Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into standard email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as whom you're emailing, when you're emailing, the subject lines, etc. From 0bc610f3ad79cf1ad418bde1d9464ea6bdab4191 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:16:56 -0700 Subject: [PATCH 12/27] update: Remove "Web Key Discovery" mentions after WKD added to glossary Signed-off-by: redoomed1 --- docs/email.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/email.md b/docs/email.md index 56edeacb..68957671 100644 --- a/docs/email.md +++ b/docs/email.md @@ -108,7 +108,7 @@ Certain information stored in [Proton Contacts](https://proton.me/support/proton #### :material-check:{ .pg-green } Email Encryption -Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. Proton also supports automatic external key discovery with [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This means that emails sent to other providers which use WKD will be automatically encrypted with OpenPGP as well, without the need to manually exchange public PGP keys with your contacts. They also allow you to [encrypt messages to non-Proton Mail addresses without OpenPGP](https://proton.me/support/password-protected-emails), without the need for them to sign up for a Proton Mail account. +Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. Proton also supports automatic external key discovery with WKD. This means that emails sent to other providers which use WKD will be automatically encrypted with OpenPGP as well, without the need to manually exchange public PGP keys with your contacts. They also allow you to [encrypt messages to non-Proton Mail addresses without OpenPGP](https://proton.me/support/password-protected-emails), without the need for them to sign up for a Proton Mail account. Proton Mail also publishes the public keys of Proton accounts via HTTP from their WKD. This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Proton's own domains, like `@proton.me`. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -159,13 +159,13 @@ Mailbox.org supports [two-factor authentication](https://kb.mailbox.org/en/priva Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that data. +However, [Open-Xchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that data. #### :material-check:{ .pg-green } Email Encryption Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. -Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately. +Mailbox.org also supports the discovery of public keys via HTTP from their WKD. This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like `@mailbox.org`. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately. #### :material-information-outline:{ .pg-blue } Account Termination @@ -325,7 +325,7 @@ We regard these features as important in order to provide a safe and optimal ser - Should encrypt all account data (contacts, calendars, etc.) at rest with zero-access encryption. - Should provide integrated webmail E2EE/PGP encryption as a convenience. -- Should support [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` +- Should support WKD to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key with this command: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Should support [sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing). - Catch-all or alias functionality for those who use their own domains. From 98a0e935daa36d4e841d0b89eaca432ac3fdf7bc Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:17:23 -0700 Subject: [PATCH 13/27] style: Correct title case Signed-off-by: redoomed1 --- docs/email.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/email.md b/docs/email.md index 68957671..87200788 100644 --- a/docs/email.md +++ b/docs/email.md @@ -19,7 +19,7 @@ Email is practically a necessity for using any online service, however we do not For everything else, we recommend a variety of email providers based on sustainable business models and built-in security and privacy features. Read our [full list of criteria](#criteria) for more information. -| Provider | OpenPGP / WKD | IMAP / SMTP | Zero-access Encryption | Anonymous Payment Methods | +| Provider | OpenPGP / WKD | IMAP / SMTP | Zero-Access Encryption | Anonymous Payment Methods | |---|---|---|---|---| | [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Paid plans only | :material-check:{ .pg-green } | Cash | | [Mailbox.org](#mailboxorg) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | Cash | From 28bd81c5402d94543145f97e2ede204834fb1612 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:19:12 -0700 Subject: [PATCH 14/27] update: Add OAuth to glossary Signed-off-by: redoomed1 --- includes/abbreviations.en.txt | 1 + 1 file changed, 1 insertion(+) diff --git a/includes/abbreviations.en.txt b/includes/abbreviations.en.txt index 270bf1b5..cb9fc43a 100644 --- a/includes/abbreviations.en.txt +++ b/includes/abbreviations.en.txt @@ -61,6 +61,7 @@ *[NAT]: Network Address Translation *[NAT-PMP]: NAT (Network Address Translation) Port Mapping Protocol *[NTP]: Network Time Protocol +*[OAuth]: Open Authorization (authnetication protocol) *[OCI]: Open Container Initiative *[OCSP]: Online Certificate Status Protocol *[OEM]: Original Equipment Manufacturer From e0b97f330bc1299b3218ced27d232a3eb3c19e5a Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:21:18 -0700 Subject: [PATCH 15/27] update: Add internal link to OAuth section Signed-off-by: redoomed1 --- docs/basics/email-security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/basics/email-security.md b/docs/basics/email-security.md index ae211ca9..1d6aeada 100644 --- a/docs/basics/email-security.md +++ b/docs/basics/email-security.md @@ -29,7 +29,7 @@ If you use a shared domain from a provider which doesn't support WKD, like `@gma ### What Email Clients Support E2EE? -Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the [email clients we recommend](../email-clients.md). Depending on the authentication method, this may lead to decreased security if either the provider or the email client does not support OAuth or a bridge application as [multifactor authentication](multi-factor-authentication.md) is not possible with plain password authentication. +Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the [email clients we recommend](../email-clients.md). Depending on the authentication method, this may lead to decreased security if either the provider or the email client does not support [OAuth](account-creation.md#sign-in-with-oauth) or a bridge application as [multifactor authentication](multi-factor-authentication.md) is not possible with plain password authentication. ### How Do I Protect My Private Keys? From ae7bcf5aa1018e6b521d64a3dcb3bf81654160ca Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:23:52 -0700 Subject: [PATCH 16/27] update: Replace external link with internal link Signed-off-by: redoomed1 --- docs/email-clients.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/email-clients.md b/docs/email-clients.md index 90db2b0b..6280d20d 100644 --- a/docs/email-clients.md +++ b/docs/email-clients.md @@ -9,7 +9,7 @@ cover: email-clients.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -The **email clients** we recommend support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) to prevent account theft. +The **email clients** we recommend support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](account-creation.md#sign-in-with-oauth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) to prevent account theft.
Email does not provide forward secrecy From 32876c01e2bb7ff7d4366849c203ae53bdc25377 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:27:02 -0700 Subject: [PATCH 17/27] fix: Internal link path Signed-off-by: redoomed1 --- docs/email-clients.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/email-clients.md b/docs/email-clients.md index 6280d20d..ad295646 100644 --- a/docs/email-clients.md +++ b/docs/email-clients.md @@ -9,7 +9,7 @@ cover: email-clients.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -The **email clients** we recommend support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](account-creation.md#sign-in-with-oauth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) to prevent account theft. +The **email clients** we recommend support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](basics/account-creation.md#sign-in-with-oauth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) to prevent account theft.
Email does not provide forward secrecy From 90dc46a2eba2da0f94846206f18a1615e9074f0b Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:32:00 -0700 Subject: [PATCH 18/27] update: Embed Wikipedia article about OAuth to OAuth article Signed-off-by: redoomed1 --- docs/basics/account-creation.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/docs/basics/account-creation.md b/docs/basics/account-creation.md index 9fc569f0..0dc7976f 100644 --- a/docs/basics/account-creation.md +++ b/docs/basics/account-creation.md @@ -50,19 +50,19 @@ Should a service get hacked, you might start receiving phishing or spam emails t ### "Sign in with..." (OAuth) -OAuth is an authentication protocol that allows you to register for a service without sharing much information with the service provider, if any, by using an existing account you have with another service instead. Whenever you see something along the lines of "Sign in with *provider name*" on a registration form, it's typically using OAuth. +[Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth) is an authentication protocol that allows you to register for a service without sharing much information with the service provider, if any, by using an existing account you have with another service instead. Whenever you see something along the lines of "Sign in with *provider name*" on a registration form, it's typically using OAuth. When you sign in with OAuth, it will open a login page with the provider you choose, and your existing account and new account will be connected. Your password won't be shared, but some basic information typically will (you can review it during the login request). This process is needed every time you want to log in to the same account. The main advantages are: -- **Security**: you don't have to trust the security practices of the service you're logging into when it comes to storing your login credentials, because they are stored with the external OAuth provider, which when it comes to services like Apple and Google typically follow the best security practices, continuously audit their authentication systems, and don't store credentials inappropriately (such as in plain text). -- **Ease of use**: multiple accounts are managed by a single login. +- **Security**: You don't have to trust the security practices of the service you're logging into when it comes to storing your login credentials because they are stored with the external OAuth provider. Common OAuth providers like Apple and Google typically follow the best security practices, continuously audit their authentication systems, and don't store credentials inappropriately (such as in plain text). +- **Ease-of-use**: Multiple accounts are managed by a single login. But there are disadvantages: -- **Privacy**: the OAuth provider you log in with will know the services you use. -- **Centralization**: if the account you use for OAuth is compromised, or you aren't able to log in to it, all other accounts connected to it are affected. +- **Privacy**: The OAuth provider you log in with will know the services you use. +- **Centralization**: If the account you use for OAuth is compromised, or you aren't able to log in to it, all other accounts connected to it are affected. OAuth can be especially useful in those situations where you could benefit from deeper integration between services. Our recommendation is to limit using OAuth to only where you need it, and always protect the main account with [MFA](multi-factor-authentication.md). From 88f678be299b2f799bf57227751862b829311a90 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:40:03 -0700 Subject: [PATCH 19/27] update: Path to disabling advertising ID and replace ext link with int link Signed-off-by: redoomed1 --- docs/os/android-overview.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/docs/os/android-overview.md b/docs/os/android-overview.md index 329fb23d..b965ca9b 100644 --- a/docs/os/android-overview.md +++ b/docs/os/android-overview.md @@ -131,7 +131,7 @@ If you have a Google account we suggest enrolling in the [Advanced Protection Pr The Advanced Protection Program provides enhanced threat monitoring and enables: -- Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) +- Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](../basics/account-creation.md#sign-in-with-oauth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts - Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome @@ -153,7 +153,9 @@ If you have an EOL device shipped with Android 10 or above and are unable to run All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. -On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. +On Android distributions with [sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **All services** → **Ads**. + +- [x] Select **Delete advertising ID**. On Android distributions with privileged Google Play Services (which includes the stock installation on most devices), the setting may be in one of several locations. Check From 250ef742bfb4955d1063cd17d421b482b34ec07f Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:48:11 -0700 Subject: [PATCH 20/27] refactor: Revert addition of OAuth to glossary Signed-off-by: redoomed1 --- includes/abbreviations.en.txt | 1 - 1 file changed, 1 deletion(-) diff --git a/includes/abbreviations.en.txt b/includes/abbreviations.en.txt index cb9fc43a..270bf1b5 100644 --- a/includes/abbreviations.en.txt +++ b/includes/abbreviations.en.txt @@ -61,7 +61,6 @@ *[NAT]: Network Address Translation *[NAT-PMP]: NAT (Network Address Translation) Port Mapping Protocol *[NTP]: Network Time Protocol -*[OAuth]: Open Authorization (authnetication protocol) *[OCI]: Open Container Initiative *[OCSP]: Online Certificate Status Protocol *[OEM]: Original Equipment Manufacturer From bd6a66c5be1067058218b3d0d326112754664fc0 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 15:57:45 -0700 Subject: [PATCH 21/27] refactor: Revert extraneous change (will be included in #2974) Signed-off-by: redoomed1 --- includes/abbreviations.en.txt | 46 +++++++++++++++++------------------ 1 file changed, 22 insertions(+), 24 deletions(-) diff --git a/includes/abbreviations.en.txt b/includes/abbreviations.en.txt index 270bf1b5..c127370b 100644 --- a/includes/abbreviations.en.txt +++ b/includes/abbreviations.en.txt @@ -2,42 +2,42 @@ *[ADB]: Android Debug Bridge *[AOSP]: Android Open Source Project *[ATA]: Advanced Technology Attachment -*[attack surface]: The total number of possible entry points for unauthorized access to a system. +*[attack surface]: The total number of possible entry points for unauthorized access to a system *[AVB]: Android Verified Boot *[cgroups]: Control Groups *[CLI]: Command Line Interface *[CSV]: Comma-Separated Values *[CVE]: Common Vulnerabilities and Exposures -*[dark pattern]: A deceptive design pattern intended to trick a user into taking certain actions. -*[digital legacy feature]: Digital legacy refers to features that allow you to give other people access to your data when you die. +*[dark pattern]: A deceptive design pattern intended to trick a user into doing things +*[digital legacy feature]: Digital Legacy refers to features that allow you to give other people access to your data when you die *[DNSSEC]: Domain Name System Security Extensions *[DNS]: Domain Name System *[DoH]: DNS over HTTPS *[DoQ]: DNS over QUIC *[DoH3]: DNS over HTTP/3 *[DoT]: DNS over TLS -*[DPI]: Deep Packet Inspection +*[DPI]: Deep Packet Inspection identifies and blocks packet with specific payloads *[E2EE]: End-to-End Encryption/Encrypted *[ECS]: EDNS Client Subnet *[EEA]: European Economic Area -*[entropy]: A measurement of how unpredictable something is. +*[entropy]: A measurement of how unpredictable something is *[EOL]: End-of-Life *[Exif]: Exchangeable image file format *[FCM]: Firebase Cloud Messaging *[FDE]: Full Disk Encryption *[FIDO]: Fast IDentity Online *[FS]: Forward Secrecy -*[fork]: A new software project created by copying an existing project and adding to it independently. +*[fork]: A new software project created by copying an existing project and adding to it independently *[GDPR]: General Data Protection Regulation *[GPG]: GNU Privacy Guard (PGP implementation) *[GPS]: Global Positioning System *[GUI]: Graphical User Interface *[GnuPG]: GNU Privacy Guard (PGP implementation) *[HDD]: Hard Disk Drive -*[HOTP]: HMAC (Hash-based Message Authentication Code) -based One-Time Password +*[HOTP]: HMAC (Hash-based Message Authentication Code) based One-Time Password *[HTTPS]: Hypertext Transfer Protocol Secure *[HTTP]: Hypertext Transfer Protocol -*[hypervisor]: Computer software, firmware, or hardware that splits the resources of a CPU among multiple operating systems. +*[hypervisor]: Computer software, firmware, or hardware that splits the resources of a CPU among multiple operating systems *[ICCID]: Integrated Circuit Card Identifier *[IMAP]: Internet Message Access Protocol *[IMEI]: International Mobile Equipment Identity @@ -50,22 +50,21 @@ *[JNI]: Java Native Interface *[KYC]: Know Your Customer *[LLaVA]: Large Language and Vision Assistant (multimodal AI model) -*[LLM]: Large Language Model (AI model such as ChatGPT) *[LLMs]: Large Language Models (AI models such as ChatGPT) -*[LUKS]: Linux Unified Key Setup (full disk encryption) +*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption) *[MAC]: Media Access Control *[MDAG]: Microsoft Defender Application Guard *[MEID]: Mobile Equipment Identifier *[MFA]: Multi-Factor Authentication -*[NVMe]: Non-Volatile Memory Express -*[NAT]: Network Address Translation -*[NAT-PMP]: NAT (Network Address Translation) Port Mapping Protocol +*[NVMe]: Nonvolatile Memory Express +*[NAT]: Network address translation +*[NAT-PMP]: NAT Port Mapping Protocol *[NTP]: Network Time Protocol *[OCI]: Open Container Initiative *[OCSP]: Online Certificate Status Protocol *[OEM]: Original Equipment Manufacturer *[OEMs]: Original Equipment Manufacturers -*[open-weights model]: An AI model that anyone can download and use, but the underlying training data and/or algorithms for it are proprietary. +*[open-weights]: An open weights-model is an AI model that anyone can download and use, but for which the underlying training data and/or algorithms are proprietary. *[OS]: Operating System *[OTP]: One-Time Password *[OTPs]: One-Time Passwords @@ -73,12 +72,12 @@ *[P2P]: Peer-to-Peer *[PAM]: Linux Pluggable Authentication Modules *[POP3]: Post Office Protocol 3 -*[PGP]: Pretty Good Privacy +*[PGP]: Pretty Good Privacy (see OpenPGP) *[PII]: Personally Identifiable Information *[QNAME]: Qualified Name -*[QUIC]: A network protocol that is based on UDP, but aims to combine the speed of UDP with the reliability of TCP. +*[QUIC]: A network protocol based on UDP, but aiming to combine the speed of UDP with the reliability of TCP. *[rate limits]: Rate limits are restrictions that a service imposes on the number of times a user can access their services within a specified period of time. -*[rolling release]: Updates which are released frequently rather than at set intervals. +*[rolling release]: Updates which are released frequently rather than set intervals *[RSS]: Really Simple Syndication *[SELinux]: Security-Enhanced Linux *[SIM]: Subscriber Identity Module @@ -87,17 +86,17 @@ *[SNI]: Server Name Indication *[SSD]: Solid-State Drive *[SSH]: Secure Shell -*[SUID]: Set User Identity +*[SUID]: Set Owner User ID *[SaaS]: Software as a Service (cloud software) *[SoC]: System on Chip -*[SSO]: Single Sign-On -*[system prompt]: The general instructions given by a human to guide how an AI chat should operate. -*[temperature]: A parameter used in AI models to control the level of randomness and creativity in the generated text. +*[SSO]: Single sign-on +*[system prompt]: The system prompt of an AI chat is the general instructions given by a human to guide how it should operate. +*[temperature]: AI temperature is a parameter used in AI models to control the level of randomness and creativity in the generated text. *[TCP]: Transmission Control Protocol *[TEE]: Trusted Execution Environment *[TLS]: Transport Layer Security *[ToS]: Terms of Service -*[TOTP]: Time-Based One-Time Password +*[TOTP]: Time-based One-Time Password *[TPM]: Trusted Platform Module *[U2F]: Universal 2nd Factor *[UEFI]: Unified Extensible Firmware Interface @@ -106,7 +105,6 @@ *[VLAN]: Virtual Local Area Network *[VoIP]: Voice over IP (Internet Protocol) *[W3C]: World Wide Web Consortium -*[WKD] Web Key Directory *[XMPP]: Extensible Messaging and Presence Protocol *[PWA]: Progressive Web App -*[PWAs]: Progressive Web Apps +*[WKD]: Web Key Discovery From 48ed2f138b8c20aaadd35dd0a5947462a8dc6e61 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 19:40:25 -0700 Subject: [PATCH 22/27] refactor: Revert extraneous change (included in #2974) Signed-off-by: redoomed1 --- includes/abbreviations.en.txt | 1 - 1 file changed, 1 deletion(-) diff --git a/includes/abbreviations.en.txt b/includes/abbreviations.en.txt index c127370b..4d2f9ada 100644 --- a/includes/abbreviations.en.txt +++ b/includes/abbreviations.en.txt @@ -107,4 +107,3 @@ *[W3C]: World Wide Web Consortium *[XMPP]: Extensible Messaging and Presence Protocol *[PWA]: Progressive Web App -*[WKD]: Web Key Discovery From 6f66d963bcfa25d4662b59055bc6e3256e26065f Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 19:42:54 -0700 Subject: [PATCH 23/27] refactor: Revert extraneous change (included in #2974) Signed-off-by: redoomed1 --- docs/basics/email-security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/basics/email-security.md b/docs/basics/email-security.md index 1d6aeada..c8bdd2bb 100644 --- a/docs/basics/email-security.md +++ b/docs/basics/email-security.md @@ -19,7 +19,7 @@ Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipe ## What is the Web Key Directory standard? -The [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD) standard allows email clients to discover the OpenPGP key for other mailboxes, even those hosted on a different provider. Email clients which support WKD will ask the recipient's server for a key based on the email address' domain name. For example, if you emailed `jonah@privacyguides.org`, your email client would ask `privacyguides.org` for Jonah's OpenPGP key, and if `privacyguides.org` has a key for that account, your message would be automatically encrypted. +The Web Key Directory (WKD) standard allows email clients to discover the OpenPGP key for other mailboxes, even those hosted on a different provider. Email clients which support WKD will ask the recipient's server for a key based on the email address' domain name. For example, if you emailed `jonah@privacyguides.org`, your email client would ask `privacyguides.org` for Jonah's OpenPGP key, and if `privacyguides.org` has a key for that account, your message would be automatically encrypted. In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. From def153c0dab5b8bd57956c7f23fb31773ad6cd76 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sat, 22 Mar 2025 19:47:45 -0700 Subject: [PATCH 24/27] refactor: Revert extraneous change (included in #2974) Signed-off-by: redoomed1 --- docs/email.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/email.md b/docs/email.md index 87200788..7319e5c1 100644 --- a/docs/email.md +++ b/docs/email.md @@ -31,7 +31,7 @@ In addition to (or instead of) an email provider recommended here, you may wish ## OpenPGP Compatible Services -These providers natively support OpenPGP encryption/decryption and the [Web Key Directory (WKD) standard](basics/email-security.md#what-is-the-web-key-directory-standard), allowing for provider-agnostic end-to-end encrypted emails. For example, a Proton Mail user could send an E2EE message to a Mailbox.org user, or you could receive OpenPGP-encrypted notifications from internet services which support it. +These providers natively support OpenPGP encryption/decryption and the [Web Key Directory standard](basics/email-security.md#what-is-the-web-key-directory-standard), allowing for provider-agnostic end-to-end encrypted emails. For example, a Proton Mail user could send an E2EE message to a Mailbox.org user, or you could receive OpenPGP-encrypted notifications from internet services which support it.
@@ -108,7 +108,7 @@ Certain information stored in [Proton Contacts](https://proton.me/support/proton #### :material-check:{ .pg-green } Email Encryption -Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. Proton also supports automatic external key discovery with WKD. This means that emails sent to other providers which use WKD will be automatically encrypted with OpenPGP as well, without the need to manually exchange public PGP keys with your contacts. They also allow you to [encrypt messages to non-Proton Mail addresses without OpenPGP](https://proton.me/support/password-protected-emails), without the need for them to sign up for a Proton Mail account. +Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. Proton also supports automatic external key discovery with [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This means that emails sent to other providers which use WKD will be automatically encrypted with OpenPGP as well, without the need to manually exchange public PGP keys with your contacts. They also allow you to [encrypt messages to non-Proton Mail addresses without OpenPGP](https://proton.me/support/password-protected-emails), without the need for them to sign up for a Proton Mail account. Proton Mail also publishes the public keys of Proton accounts via HTTP from their WKD. This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Proton's own domains, like `@proton.me`. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -165,7 +165,7 @@ However, [Open-Xchange](https://en.wikipedia.org/wiki/Open-Xchange), the softwar Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. -Mailbox.org also supports the discovery of public keys via HTTP from their WKD. This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like `@mailbox.org`. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately. +Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like `@mailbox.org`. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately. #### :material-information-outline:{ .pg-blue } Account Termination @@ -325,7 +325,7 @@ We regard these features as important in order to provide a safe and optimal ser - Should encrypt all account data (contacts, calendars, etc.) at rest with zero-access encryption. - Should provide integrated webmail E2EE/PGP encryption as a convenience. -- Should support WKD to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key with this command: `gpg --locate-key example_user@example.com` +- Should support [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key with this command: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Should support [sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing). - Catch-all or alias functionality for those who use their own domains. From 8a91a0cd50534ad722ea80cd7db875050df84634 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sun, 23 Mar 2025 07:04:32 -0700 Subject: [PATCH 25/27] style: Tense change Signed-off-by: redoomed1 --- docs/basics/account-creation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/basics/account-creation.md b/docs/basics/account-creation.md index 0dc7976f..19a6a485 100644 --- a/docs/basics/account-creation.md +++ b/docs/basics/account-creation.md @@ -42,7 +42,7 @@ You will be responsible for managing your login credentials. For added security, #### Email aliases -If you don't want to give your real email address to a service, you have the option to use an alias. We described them in more detail on our email services recommendation page. Essentially, alias services allow you to generate new email addresses that forward all emails to your main address. This can help prevent tracking across services and help you manage the marketing emails that sometimes come with the sign-up process. Those can be filtered automatically based on the alias they are sent to. +If you don't want to give your real email address to a service, you have the option to use an alias. We describe them in more detail on our email services recommendation page. Essentially, alias services allow you to generate new email addresses that forward all emails to your main address. This can help prevent tracking across services and help you manage the marketing emails that sometimes come with the sign-up process. Those can be filtered automatically based on the alias they are sent to. Should a service get hacked, you might start receiving phishing or spam emails to the address you used to sign up. Using unique aliases for each service can assist in identifying exactly what service was hacked. From 6a15d42291e95ae430761a554b0963c8cd19a234 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sun, 23 Mar 2025 07:07:26 -0700 Subject: [PATCH 26/27] style: Remove unnecessary period Signed-off-by: redoomed1 --- docs/os/android-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/os/android-overview.md b/docs/os/android-overview.md index b965ca9b..502b68ab 100644 --- a/docs/os/android-overview.md +++ b/docs/os/android-overview.md @@ -155,7 +155,7 @@ All devices with Google Play Services installed automatically generate an [adver On Android distributions with [sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **All services** → **Ads**. -- [x] Select **Delete advertising ID**. +- [x] Select **Delete advertising ID** On Android distributions with privileged Google Play Services (which includes the stock installation on most devices), the setting may be in one of several locations. Check From 27989b34b0685446a5767aea015ecc086bba6a17 Mon Sep 17 00:00:00 2001 From: redoomed1 Date: Sun, 23 Mar 2025 20:03:35 -0700 Subject: [PATCH 27/27] update: Revert changes to Addy.io mobile download links to prevent confusion Signed-off-by: redoomed1 --- docs/email-aliasing.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/email-aliasing.md b/docs/email-aliasing.md index c8834f42..f82439d4 100644 --- a/docs/email-aliasing.md +++ b/docs/email-aliasing.md @@ -58,8 +58,8 @@ Using an aliasing service requires trusting both your email provider and your al
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=host.stjin.anonaddy) -- [:simple-appstore: App Store](https://apps.apple.com/app/id6563138633) +- [:simple-googleplay: Google Play](https://addy.io/faq/#is-there-an-android-app) +- [:simple-appstore: App Store](https://addy.io/faq/#is-there-an-ios-app) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/iadbdpnoknmbdeolbapdackdcogdmjpe)