{"id":61699,"date":"2017-05-04T09:08:33","date_gmt":"2017-05-04T16:08:33","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=61699"},"modified":"2023-03-28T00:15:23","modified_gmt":"2023-03-28T07:15:23","slug":"what-to-look-for-in-a-private-and-secure-email-service-provider","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/","title":{"rendered":"What to Look for in a Private and Secure Email Service Provider"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-66094\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Service-Provider.png\" alt=\"Secure Email Service Provider\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Service-Provider.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Service-Provider-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Service-Provider-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong><em>Please check out the newer version of this article here: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/three-free-secure-email-hosts-that-protect-your-data\/\">3 Top Free Secure Email Providers That Protect Your Data and Privacy<\/a><\/em><\/strong><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"YpWfkJMAje\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/three-free-secure-email-hosts-that-protect-your-data\/\">Three Free Secure Email Providers That Protect Your Data and Privacy<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Three Free Secure Email Providers That Protect Your Data and Privacy&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/three-free-secure-email-hosts-that-protect-your-data\/embed\/#?secret=YpWfkJMAje\" data-secret=\"YpWfkJMAje\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>More and more people\u00a0are becoming security conscious these days. A trend we certainly like to see! I frequently get asked which <a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/\" rel=\"noopener\">secure messenger<\/a> is recommended, if <a href=\"https:\/\/www.intego.com\/best-mac-antivirus-software\" rel=\"noopener\">anti-virus software<\/a> is a good idea, if a firewall and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-encrypt-and-password-protect-files-on-your-mac\/\" rel=\"noopener\">encryption<\/a> are needed, and also which email service provider should be used if one wants private and secure email exchange. The latter is a great question, and one which we&#8217;ll\u00a0answer today.<\/p>\n<p>Email providers that offer privacy, and security specifically, is what this article will focus on. There are quite a few email\u00a0providers out there, so rather than just proclaim one as the best, we&#8217;ll explain\u00a0what to look for in a secure and private email provider. In this way,\u00a0you&#8217;ll be armed with\u00a0all the information needed to make the best choice for you.<\/p>\n<h3>How secure is your email?<\/h3>\n<p>Having a password on your email account means only you can log in and read its contents, right? Unfortunately, this is not the case. Email was not designed with privacy and security in mind, and what little security is available today is a bolt-on solution. Email itself is as insecure as it was decades ago, but stronger authentication methods to get to the stored email and encryption for the emails themselves and server connections are now available that may keep email around a bit longer yet. For a great article on why email is not secure, <a href=\"https:\/\/www.digitaltrends.com\/computing\/can-email-ever-be-secure\/\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>Sadly, email providers often have access to your stored emails; some providers even read your email, so they can send you more targeted advertising.\u00a0Government and ISP snooping can be a risk as well, and of course, email providers can get hacked just like any other business. Then there is the intercepting of emails while they are in transit. And the list goes on. So, what can you do to protect and secure your email?\u00a0Use a secure email provider, of course!<\/p>\n<p>Following is\u00a0a 7-point checklist of what to\u00a0look for in a secure email provider.<\/p>\n<h3>1. Cost and payment methods<\/h3>\n<p>Being an email provider means operating servers, performing maintenance, supporting customers, and more.\u00a0These things cost money, so a good email service will likely charge for an account. How much is cheap and how much is outrageous is completely up to you. It all depends on\u00a0how much you want or need that service.<\/p>\n<p>I asked a good friend what he would consider a reasonable cost for a private email service, and he suggested\u00a0that\u00a0$20 a month seems like a good price if it meant his email was private and secure.\u00a0Personally, however, I would\u00a0consider paying $20 for the year tops. It really just\u00a0depends on the person and their needs.<\/p>\n<p>Payment methods can be a deciding factor as well. Does a provider accept VISA or PayPal? What if the account and its creation must be completely anonymous? Does a provider accept bitcoin? These are all factors you should consider when looking for a secure email provider.<\/p>\n<h3>2. Free accounts<\/h3>\n<p>Some email providers offer their service completely free, and some offer a free basic account but charge for more storage space and features. If you don&#8217;t pay for the product, you are the product. After all, email providers still have to pay the bills, so if their users are not paying, can you guess where\u00a0that money comes from? You got it: Advertising.<\/p>\n<p>In the case of providers that charge for accounts, but offer a free tier, then &#8220;free&#8221; might actually be free. While they want you to be happy with a free account, they hope you\u00a0will spend money to upgrade. If the provider only offers free full-featured accounts, it&#8217;s worth investigating how they pay their bills. Your email may be scanned for content to target you for advertising, or your information may be <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-maintain-your-privacy-on-the-internet\/\" rel=\"noopener\">sold to data brokers<\/a>. (Open source projects can be the exception.) You best option?\u00a0Don&#8217;t become the product, instead,\u00a0do the research and find a more secure provider that values your privacy.<\/p>\n<h3>3. History and reputation<\/h3>\n<p>An email provider that has been around for two decades is not necessarily better or more secure than a provider that started in 2014. Time in service\u00a0doesn&#8217;t necessarily\u00a0mean they have more experience or are the best option; after all, a\u00a0provider that started in 2014 may have hired staff who did\u00a0work for many years at other providers and bring their experience to the table. Therefore, it&#8217;s best not to let the age of a provider be a deciding factor. However, reputation is important.<\/p>\n<p>Do some searches online for things like,\u00a0&#8220;[insert provider name] hacked&#8221; or &#8220;[insert provider name] security flaw&#8221; and see what pops up. Of course, you&#8217;ll have to investigate the claims yourself to\u00a0see if they are all true, how severe their potential issues were, and how those issues were mitigated.<\/p>\n<p>Search for some things you find most important, for example, &#8220;[insert provider name] DDoS,&#8221; if you want to know if the provider has ever been under attack and how they dealt with it. How about their product support? Is it trustworthy? Helpful? Do a search for &#8220;[insert provider name] Support&#8221; and the\u00a0results might show you stories about how horrible their support and response times are or if their support is simply amazing. These are all things that can help you in your quest to find the right email provider for you.<\/p>\n<h3>4. Encryption<\/h3>\n<p>There would be no security and privacy if encryption was not involved in some way. Most email providers know that these kinds of details are very important to their potential customers, so will they typically tell you all about it on their website. Are server connections encrypted? Is data at rest encrypted? Does an <a href=\"https:\/\/www.ssllabs.com\/ssltest\/\" target=\"_blank\" rel=\"noopener\">SSL test<\/a> show any issues? Make sure you take your time and read all the details.<\/p>\n<h3>5. Logs<\/h3>\n<p>A secure and private email provider that logs everything will likely not be in business long. Logs must be kept for various reasons, such as DDoS protection, but the amount of data that is logged and how long those logs are kept should factor into your decision. Less data logged and short log retention is what you&#8217;re after.<\/p>\n<h3>6. IP Stripping<\/h3>\n<p>You want your IP address stripped out of the email headers, so that the recipient cannot find out who your Internet provider is or\u00a0your location. The same goes for the server logs:\u00a0make sure your IP masked, anonymized or completely removed (these details will likely be found in the provider&#8217;s logging policies).<\/p>\n<h3>7. Privacy policy and terms<\/h3>\n<p>The privacy policy and terms &amp; conditions should always be read. Not just for a secure email provider but for every service that has them. It typically gives you a good sense of how your data is collected, stored and\/or used. If and how the provider will handle government requests for data is another piece of information most will find important.<\/p>\n<p>These 7 key factors are\u00a0the big ones to look out for. But that doesn&#8217;t mean these are the only things\u00a0to look for. There can be many other deciding factors for you, such as the ability to use your own domain, aliases, location, mail client compatibility, webmail access, TOR address, mobile app, and more.<\/p>\n<p>Now that you&#8217;ve been armed with the right details to look out for in a secure email provider, let&#8217;s get to some options to start your search!<\/p>\n<h3>Secure Email Service Providers<\/h3>\n<p>Below is a list of some recommended secure and private email providers to check out.<\/p>\n<p><strong>ProtonMail<\/strong><\/p>\n<p>Once touted as &#8220;<a href=\"https:\/\/www.forbes.com\/sites\/hollieslade\/2014\/05\/19\/the-only-email-system-the-nsa-cant-access\/\" target=\"_blank\" rel=\"noopener\">Being the Only Email System The NSA Can&#8217;t Access<\/a>,&#8221;\u00a0ProtonMail\u00a0is certainly a favorite. ProtonMail&#8217;s main selling points are end-to-end encryption, zero access to user data, located in Switzerland, encrypted data at rest and no tracking or logging of personally identifiable information. For all the nitty-gritty details, have a look at\u00a0their website <a href=\"https:\/\/protonmail.com\/about\" target=\"_blank\" rel=\"noopener\">here<\/a>. Interestingly enough, they also have a <a href=\"https:\/\/protonmail.com\/blog\/tor-encrypted-email\/\" target=\"_blank\" rel=\"noopener\">Tor accessible<\/a> site.<\/p>\n<p><strong>Startmail<\/strong><\/p>\n<p>Based in Europe,\u00a0Startmail is a fairly new player when it comes to providing secure and private email, but one of the oldest when it comes to <a href=\"https:\/\/www.startpage.com\/\" target=\"_blank\" rel=\"noopener\">offering privacy online<\/a>. Startmail offers one-click PGP encryption, PFS and SSL encryption, disposable email addresses and the ability to send encrypted email to anyone regardless of the provider the recipient uses. More information can be found <a href=\"https:\/\/www.startmail.com\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><strong>Posteo.de<\/strong><\/p>\n<p>Posted.de is a\u00a0pretty well known email provider that offers anonymous signup, IP stripping, anonymous payment, encryption in all the right places, two factor authentication,\u00a0<a href=\"https:\/\/posteo.de\/en\/site\/features#featuresprivacy\" target=\"_blank\" rel=\"noopener\">and more<\/a>. Located in Germany and priced very reasonably, this is definitely a provider to consider. More info <a href=\"https:\/\/posteo.de\/en\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><strong>Tutanota<\/strong><\/p>\n<p>Tutanota is completely open source, which enables security experts to verify the code that protects your emails. Their servers are located in Germany, and some of the features you get with an account are 1 GB of space, aliases, and the ability to send encrypted email to anyone regardless of the provider the recipient uses. Android and iOS apps are available, too.\u00a0While Tutanota is fairly basic,\u00a0it\u00a0gets the job done and best of all it&#8217;s free!\u00a0(A premium account is available for a price that&#8217;s very hard to beat.) More information can be found <a href=\"https:\/\/tutanota.com\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><strong>CounterMail<\/strong><\/p>\n<p>With selling points such as diskless servers, CounterMail is the only email service provider\u00a0that offer protection against man-in-the-middle attacks (as far as they know) and a USB key option that prevents account access unless plugged in.\u00a0It&#8217;s hard not to give them a try right away. Of course, with features such as end-to-end encryption, IP stripping, use of own domains and a password manager, it offers things you&#8217;d expect from the best\u00a0secure email\u00a0provider.<\/p>\n<p>Running diskless servers so that sensitive information can not be easily retrieved if stored (servers run off of CD&#8217;s) is a neat thing to mention, but CounterMail\u00a0does limit mailbox sizes significantly. Their largest mailbox size offering is 500 MB and will run $59 for the year. Additional storage can cost as much as $109 (a one time fee) for a little over 2 GB of storage total. Higher pricing is explained on their website,\u00a0saying,\u00a0&#8220;Our server have full disk encryption, which uses extra CPU and hard drive resources.&#8221; (Wait, hard drives? I thought there weren&#8217;t any!) For clarification on that, you can contact CounterMail, but all that said, they are a good option for secure and private email. More information can be found <a href=\"https:\/\/countermail.com\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><strong>Lavabit<\/strong><\/p>\n<p>Lavabit is a\u00a0secure email provider that chose to <a href=\"http:\/\/securityspread.com\/2013\/08\/08\/lavabit-forced-shut\/\" target=\"_blank\" rel=\"noopener\">shut down their service<\/a> a few years ago to prevent government access to all user accounts. Nonetheless, they deserve a special mention here. They have restarted the service, and it&#8217;s new and improved. More information can be found <a href=\"https:\/\/lavabit.com\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Some other email providers you can\u00a0check out:<\/p>\n<ul>\n<li><a href=\"https:\/\/mailfence.com\/index.jsp\" target=\"_blank\" rel=\"noopener\">Mailfence<\/a><\/li>\n<li><a href=\"https:\/\/mailbox.org\/en\/\" target=\"_blank\" rel=\"noopener\">Mailbox<\/a><\/li>\n<li><a href=\"https:\/\/runbox.com\/\" target=\"_blank\" rel=\"noopener\">Runbox<\/a><\/li>\n<li><a href=\"https:\/\/www.neomailbox.com\/\" target=\"_blank\" rel=\"noopener\">Neomailbox<\/a><\/li>\n<\/ul>\n<p>This should be enough to help you find and make an informed decision on a secure and private email provider.<\/p>\n<p><em><strong>Are you using a secure and private email provider? Share your thoughts and experiences in the comments below!<\/strong><\/em><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Please check out the newer version of this article here: 3 Top Free Secure Email Providers That Protect Your Data and Privacy Three Free Secure Email Providers That Protect Your Data and Privacy More and more people\u00a0are becoming security conscious these days. A trend we certainly like to see! I frequently get asked which secure [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":66103,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[275],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Please check out the newer version of this article here: 3 Top Free Secure Email Providers That Protect Your Data and Privacy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to Look for in a Private and Secure Email Service Provider - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Please check out the newer version of this article here: 3 Top Free Secure Email Providers That Protect Your Data and Privacy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-04T16:08:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T07:15:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/\",\"name\":\"What to Look for in a Private and Secure Email Service Provider - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#primaryimage\"},\"datePublished\":\"2017-05-04T16:08:33+00:00\",\"dateModified\":\"2023-03-28T07:15:23+00:00\",\"description\":\"Please check out the newer version of this article here: 3 Top Free Secure Email Providers That Protect Your Data and Privacy\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to Look for in a Private and Secure Email Service Provider\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"What to Look for in a Private and Secure Email Service Provider\",\"datePublished\":\"2017-05-04T16:08:33+00:00\",\"dateModified\":\"2023-03-28T07:15:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#webpage\"},\"wordCount\":1950,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png\",\"keywords\":[\"Email\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Please check out the newer version of this article here: 3 Top Free Secure Email Providers That Protect Your Data and Privacy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/","og_locale":"en_US","og_type":"article","og_title":"What to Look for in a Private and Secure Email Service Provider - The Mac Security Blog","og_description":"Please check out the newer version of this article here: 3 Top Free Secure Email Providers That Protect Your Data and Privacy","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-05-04T16:08:33+00:00","article_modified_time":"2023-03-28T07:15:23+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/","name":"What to Look for in a Private and Secure Email Service Provider - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#primaryimage"},"datePublished":"2017-05-04T16:08:33+00:00","dateModified":"2023-03-28T07:15:23+00:00","description":"Please check out the newer version of this article here: 3 Top Free Secure Email Providers That Protect Your Data and Privacy","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What to Look for in a Private and Secure Email Service Provider"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"What to Look for in a Private and Secure Email Service Provider","datePublished":"2017-05-04T16:08:33+00:00","dateModified":"2023-03-28T07:15:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#webpage"},"wordCount":1950,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png","keywords":["Email"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-to-look-for-in-a-private-and-secure-email-service-provider\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Secure-Email-Provider.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-g39","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61699"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=61699"}],"version-history":[{"count":23,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61699\/revisions"}],"predecessor-version":[{"id":97571,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61699\/revisions\/97571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/66103"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=61699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=61699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=61699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}