Skip to main content


With different plans which fit everyone's #privacy needs, Tuta makes the perfect last minute #gift for your friends and family. 🎁

You can check out all of our #encryption solutions here:
👉 tuta.com/encryption

Give the gift of privacy this #holiday season! 🎅 🎄

in reply to Tuta

is it really secure if there are backdoors though? (Like the recovery key you have stored for all accounts)
in reply to Pixelcode 🇺🇦

@pixelcode allegedly they have to have a backdoor for the German authorities to be able to get access to the inboxes of suspected criminals, and they have implemented this by having the recovery key (and you can't choose to not create a recovery key). From what I've heard they are also under a gag order, so they can't properly respond to queries about this.
in reply to spydon

@spydon In 2020, the Hanover District Court had ordered the telecommunications surveillance of a Tutanota mailbox, and the public prosecutor's office had also applied for a penalty payment and preventive detention against the managing director of Tutanota. However, Tutanota lodged an appeal against all of this, and the regional court cancelled the district court's surveillance order entirely. Also, there are no gag orders under German law.

spiegel.de/netzwelt/web/tutano…

heise.de/news/Gerichtsurteil-S…

in reply to Pixelcode 🇺🇦

@spydon In June 2019, @Curia ruled that e-mail services are not telecomunication providers, meaning they cannot be subjected to telecommunication surveillance. Before that, Itzehoe District Court had forced Tutanota to forward certain incoming unencrypted e-mails (directed to inboxes of suspected criminals) to law enforcement. End-to-end encrypted e-mails had not been affected at any point, though.

golem.de/news/europaeischer-ge…

sueddeutsche.de/digital/tutano…

This entry was edited (11 months ago)
in reply to Pixelcode 🇺🇦

@pixelcode thanks for the information! I might very well have read a FUD article.

It would be interesting to know more about how the recovery key is generated and stored (if it is), because there seems to be a lot of unanswered potential fud around that.

in reply to spydon

@spydon @pixelcode It looks like you have read a FUD article. We have zero access to your passwords and zero access to your recovery code. All code is published on GitHub so tech experts can verify that.
in reply to Tuta

thanks for clarifying that! Is there anywhere to read about how it's implemented, without having to read through all the source code?