Topics
Browse posts by category and tag — every topic we cover, with the latest pieces under each.
Tags
- #encrypted-email 5
- #privacy 4
- #beginners 3
- #email-aliases 2
- #guides 2
- #proton-mail 2
- #threat-models 2
- #tutanota 2
- #anonaddy 1
- #anonymity 1
- #comparisons 1
- #custom-domain 1
- #data-brokers 1
- #decisions 1
- #firefox-relay 1
- #gmail 1
- #metadata 1
- #migration 1
- #operational-security 1
- #portability 1
- #simplelogin 1
- #tracking 1
Categories
fundamentals 3 posts
- Do You Actually Need Encrypted Email? A Plain-Language GuideEncrypted email isn't for everyone. Here's how to figure out whether switching is worth it — without paranoia or marketing fluff.
- What Email Metadata Leaks (Even With End-to-End Encryption)End-to-end encryption protects message bodies, not the envelope. Here's exactly what metadata leaks from encrypted email and what you can do about it.
- Why Your Email Ends Up on Data Broker Lists (and What to Do)Your email address is a tracking identifier. Here's the plain-language version of how data brokers get it, what they do with it, and how to start cutting off the supply.
comparisons 2 posts
- Email Alias Services Compared: AnonAddy, SimpleLogin, RelayEmail alias services let you create unlimited throwaway addresses that forward to your real inbox. Here's how AnonAddy, SimpleLogin, and Firefox Relay stack up on privacy, features, and price.
- Proton Mail vs Tutanota in 2026: Which Encrypted Email Fits?Proton Mail and Tutanota are the two serious end-to-end encrypted email providers. They make different tradeoffs on metadata, ecosystem, and pricing. Here's how to pick.
guides 2 posts
- Custom Domain or Provider Address? A Guide to Email PortabilityIf you're setting up a new email account, should you use [email protected] or [email protected]? Here's the honest tradeoff and how to choose.
- Migrating from Gmail to Encrypted Email Without Losing Your MailA practical migration plan for moving away from Gmail to Proton Mail or Tutanota: importing history, forwarding contacts, handling 2FA recovery, and what breaks.