Skip to main content


Here's a stark reminder that any #backdoor is a #vulnerability:

"China-based hackers used a stolen sign-in key" to hack into US government's #Microsoft email accounts.

That's why we at Tutanota fight for strong encryption - without any backdoor. 🔒

https://edition.cnn.com/2023/07/12/politics/china-based-hackers-us-government-email-intl-hnk/index.html

in reply to Tuta

I'm sure the US government aren't overly concerned as they don't do anything wrong and therefore have nothing to hide... right?
in reply to Tuta

Ok, I think I have to describe the problem a bit better.
Even as you say that encryption takes place on device locally, device needs a way to get a public key of recipient. How does device do that? Right! By asking the server! But why the client should trust that it's really original key of recipient and not the replaced one by your server, guys?
Every really secure e2e messenger has a way to verify authenticity of second party. But your application has nothing to solve this.
in reply to Tuta

iyidir hoştur güvenilir:)

@Proton.me de önerelim.

😎