ProtonMail warns all users to beware of phishing scam

ProtonMail is sending a warning urging all users of the end-to-end encrypted email service to be on the lookout for phishing scams impersonating ProtonMail. “Dear ProtonMail user, over the last few days we have noticed an unusually high number of… Continue reading ProtonMail warns all users to beware of phishing scam

ProtonMail mobile apps now allow users to stash sensitive contact information

ProtonMail, an email provider known for its focus on encryption, is adding a feature to its mobile apps that allows users securely store sensitive contact information. ProtonMail’s “encrypted contacts” feature allows users to store contact information like phone numbers, addresses, URLs and other notes in the app, protected by the service’s “zero-access encryption.” “Zero-access encryption” refers to the fact the only the user can access the encrypted information. “All of this additional information is encrypted and no one but you can access it — not even we can access it,” the company wrote in a blog post. In previous versions of ProtonMail’s iOS and Android apps, users could only store contact names and email addresses. This information is not encrypted, because it would prevent ProtonMail users from being able to send messages. Even though names and email addresses aren’t fully encrypted, that information is protected with a digital signature. The signature makes it […]

The post ProtonMail mobile apps now allow users to stash sensitive contact information appeared first on Cyberscoop.

Continue reading ProtonMail mobile apps now allow users to stash sensitive contact information

How does mail email services decrypt an encrypted mail without having the sender’s Public Key?

I started using Protonmail which is an Encrypted mail service assuming it works flawless between Protonail Users. My question is how does a Gmail user decrpyt my message without having my Publick key (Protonmail) ?

Does Gma… Continue reading How does mail email services decrypt an encrypted mail without having the sender’s Public Key?