1 00:00:01,000 --> 00:00:06,000 Now in the previous lectures, we covered different types of email providers. 2 00:00:06,000 --> 00:00:13,000 Within each type there are a number of providers, and each one of these providers could have their 3 00:00:13,000 --> 00:00:14,000 own pros and cons. 4 00:00:15,000 --> 00:00:21,000 Therefore, at this stage I wouldn't blame you if you feel a little bit confused or find it a little 5 00:00:21,000 --> 00:00:24,000 bit difficult to pick, which is best for you. 6 00:00:25,000 --> 00:00:31,000 Now, the reason why I covered so many different types, because I think each one of these types is 7 00:00:31,000 --> 00:00:37,000 different from the other and one all of these types can be very, very useful because you'll be able 8 00:00:37,000 --> 00:00:41,000 to pick which is best based on your scenario. 9 00:00:42,000 --> 00:00:49,000 So as I mentioned at the start of the section, when you want to pick an email service, you want to 10 00:00:49,000 --> 00:00:51,000 keep two main things in your mind. 11 00:00:51,000 --> 00:00:55,000 Why do you want to use this service and what's your threat model? 12 00:00:55,000 --> 00:00:59,000 Who might be trying to anonymize you or discover your location? 13 00:01:00,000 --> 00:01:07,000 Keeping that in mind and in order to revise and make it easier for you to pick a good email provider 14 00:01:07,000 --> 00:01:15,000 based on your scenario, I made this simple table that summarizes everything we talked about so far. 15 00:01:16,000 --> 00:01:24,000 Now, the main thing you keep in mind is as we go down in this table, the provider type will be more 16 00:01:24,000 --> 00:01:27,000 private, more secure, and therefore more anonymous. 17 00:01:27,000 --> 00:01:30,000 But it will have less features. 18 00:01:30,000 --> 00:01:35,000 So like I said, it all comes down to why you want to use it for and what's your threat model. 19 00:01:36,000 --> 00:01:43,000 So the first type of providers we had look on where the common services such as Gmail, Hotmail, Yahoo 20 00:01:43,000 --> 00:01:45,000 Mail and all of that. 21 00:01:45,000 --> 00:01:49,000 These email providers can send emails to the clear net and to the darknet. 22 00:01:49,000 --> 00:01:50,000 As we saw. 23 00:01:51,000 --> 00:01:54,000 They all use JavaScript so they are less secure. 24 00:01:54,000 --> 00:02:00,000 We know that they heavily track you and log everything you do, so they are not private. 25 00:02:00,000 --> 00:02:05,000 Like I said, if you really want to use this, you want to make sure that you use fake identity and 26 00:02:05,000 --> 00:02:12,000 never communicate with your own email addresses or any other email addresses that can link to your real 27 00:02:12,000 --> 00:02:13,000 identity. 28 00:02:14,000 --> 00:02:20,000 They do not offer a hidden onion service link and they do use HTTPS encryption. 29 00:02:21,000 --> 00:02:22,000 So these were the base. 30 00:02:23,000 --> 00:02:30,000 Then the other example we had was the temporary emails, which in my opinion can be very, very useful 31 00:02:30,000 --> 00:02:31,000 in so many scenarios. 32 00:02:31,000 --> 00:02:35,000 Like we said, they don't require any personal information to sign up. 33 00:02:35,000 --> 00:02:36,000 There is no sign up. 34 00:02:36,000 --> 00:02:42,000 You literally get an inbox straight away and you can use it so you can have unlimited number of emails 35 00:02:42,000 --> 00:02:45,000 because you're never asked to sign up. 36 00:02:45,000 --> 00:02:50,000 They are more private and more anonymous than the normal email providers. 37 00:02:50,000 --> 00:02:54,000 They do use JavaScript, so again, they're not as secure as possible. 38 00:02:54,000 --> 00:02:56,000 They might be log in you. 39 00:02:56,000 --> 00:03:00,000 But the cool thing is some of them offer a hidden service. 40 00:03:00,000 --> 00:03:04,000 So you never need to exit the Tor network when you're using them. 41 00:03:04,000 --> 00:03:08,000 And they also use HTTPS to add an extra layer of encryption. 42 00:03:08,000 --> 00:03:13,000 So this is a really, really good option if you know what you're doing, if you just want a temporary 43 00:03:13,000 --> 00:03:19,000 email to send, to send something quickly, to receive something quickly, and this and this will actually 44 00:03:19,000 --> 00:03:21,000 be destroyed once you're done with it. 45 00:03:21,000 --> 00:03:23,000 So it can be anonymous enough. 46 00:03:23,000 --> 00:03:29,000 It can be great in so many scenarios, again, if you're trying to just bypass a registration form and 47 00:03:29,000 --> 00:03:30,000 so on. 48 00:03:31,000 --> 00:03:38,000 The next email providers that we had to look on were the privacy focused or what I called hybrid services 49 00:03:38,000 --> 00:03:42,000 so they can communicate with clear net and darknet services. 50 00:03:42,000 --> 00:03:45,000 They they have a lot of nice features. 51 00:03:45,000 --> 00:03:51,000 What really differentiates them from the common services such as Gmail, Yahoo and all of that is the 52 00:03:51,000 --> 00:03:53,000 fact that they will not track you. 53 00:03:53,000 --> 00:03:55,000 They won't be log in your movement. 54 00:03:56,000 --> 00:03:58,000 They don't require personal information. 55 00:03:58,000 --> 00:04:00,000 Like I said, these are privacy focused. 56 00:04:01,000 --> 00:04:04,000 Some of them will even have a darknet address. 57 00:04:04,000 --> 00:04:09,000 So again, you can access them without exiting the Tor network, which will improve your privacy and 58 00:04:09,000 --> 00:04:10,000 anonymity. 59 00:04:11,000 --> 00:04:13,000 Some of them use end to end encryption again. 60 00:04:13,000 --> 00:04:16,000 In our example, Protonmail uses end to end encryption. 61 00:04:16,000 --> 00:04:21,000 So like I said, even if they wanted to see what you're doing, they won't be able to see it. 62 00:04:22,000 --> 00:04:27,000 The only problem with these providers is the fact that they are real, proper companies. 63 00:04:27,000 --> 00:04:34,000 They have servers on the clear net and they have complied to court orders and disclosed information 64 00:04:34,000 --> 00:04:36,000 about their users previously. 65 00:04:36,000 --> 00:04:41,000 Now, like I said, they keep no logs and they require no personal information and they use end to end 66 00:04:41,000 --> 00:04:42,000 encryption. 67 00:04:42,000 --> 00:04:47,000 So the amount of information they can share is limited because they don't know a lot. 68 00:04:47,000 --> 00:04:54,000 But again, the fact that they do comply sometimes puts them in second place in terms of anonymity. 69 00:04:55,000 --> 00:04:59,000 The other thing that you want to keep in mind is the fact that they require JavaScript. 70 00:04:59,000 --> 00:05:04,000 So when you use them, you need to have your security settings in the Tor browser to medium, which 71 00:05:04,000 --> 00:05:06,000 is not very secure. 72 00:05:06,000 --> 00:05:13,000 But if you're using Protonmail or any other reputable email provider, and if that email provider is 73 00:05:13,000 --> 00:05:20,000 used in https, then it is secure enough to enable JavaScript and the medium level. 74 00:05:20,000 --> 00:05:24,000 But again, this is still not as secure and as anonymous as possible. 75 00:05:25,000 --> 00:05:31,000 This led us to the last email providers which are completely available on the darknet. 76 00:05:31,000 --> 00:05:33,000 They have no clear net addresses. 77 00:05:34,000 --> 00:05:37,000 So again, when you use them, you never exit the terror network. 78 00:05:37,000 --> 00:05:40,000 This increases your privacy and anonymity. 79 00:05:41,000 --> 00:05:47,000 They also do not require JavaScript, so you can put your security settings to the highest where JavaScript 80 00:05:47,000 --> 00:05:53,000 and all of the other features of the browser are disabled that can be used to reduce your security or 81 00:05:54,000 --> 00:05:55,000 anonymize you. 82 00:05:55,000 --> 00:06:01,000 Some of these providers allow you to communicate with both clear net and Darknet addresses, such as 83 00:06:01,000 --> 00:06:01,000 Elude. 84 00:06:01,000 --> 00:06:08,000 And we also had an example of Tor Box, which is a provider that only allows you to communicate with 85 00:06:08,000 --> 00:06:09,000 Darknet addresses. 86 00:06:09,000 --> 00:06:15,000 Now this is great because like I said, it keeps you limited and it keeps you as anonymous as possible. 87 00:06:15,000 --> 00:06:19,000 Now it goes without saying that none of these services track you. 88 00:06:19,000 --> 00:06:22,000 None of them keep logs because they run as onion services. 89 00:06:22,000 --> 00:06:27,000 They make full use of the privacy provided by Tor. 90 00:06:27,000 --> 00:06:34,000 And on top of that, some providers such as ELUDE provides end to end encryption and even personally 91 00:06:34,000 --> 00:06:37,000 encrypt the storage that stores your emails. 92 00:06:38,000 --> 00:06:44,000 And again, because these are Darknet services, the location of their servers is unknown and they're 93 00:06:44,000 --> 00:06:51,000 less likely to comply with court orders or to get influenced by government agencies and so on. 94 00:06:52,000 --> 00:06:59,000 Now, like I said, the examples that I'm giving you in here, these are just single examples of the 95 00:06:59,000 --> 00:07:01,000 categories that we see here on the left. 96 00:07:01,000 --> 00:07:07,000 So do your own research if you want to learn more about each one of these categories and don't just 97 00:07:07,000 --> 00:07:09,000 take my word for granted. 98 00:07:09,000 --> 00:07:13,000 Go read the privacy policy, read the history of each of these companies. 99 00:07:13,000 --> 00:07:19,000 Make sure that this company or this provider is the best for you, for your scenario, and only then 100 00:07:19,000 --> 00:07:20,000 start using it.