Wszechstronne szyfrowanie, brak śledzenia, otwarte oprogramowanie - istnieje wiele czynników, które sprawiają, że Tutanota jest najbezpieczniejszym dostawcą poczty e-mail na świecie. Zapoznaj się szczegółowo z funkcjami bezpieczeństwa Tutanota i dowiedz się, w jaki sposób różne środki bezpieczeństwa chronią twoje wrażliwe dane.
When evaluating the security and privacy of any online service, always ask yourself the following questions:
Who pays for it? The users or the advertisers? If the answer is "the advertisers", the service can never offer a truly secure and private solution. Its top priority is the advertisers’ interest by helping them to identify target audiences based on users’ data and to serve them ads. Protecting users' privacy always comes second with such a business model.
Who controls the tech stack? This is a very technical but crucially important question. If a service uses third-party 'tech' such as Dovecot, Roundcube, Google reCaptcha or Google Push, you know for sure that security and privacy cannot be its core priority as the provider knowingly leaks information to others - without warning the users about this. This is another reason why you should choose a service that is open source and doesn’t rely on integrations with closed-source software.
What data is encrypted end-to-end (E2E)? Many providers claim that their service provides secure email and that the data stored with them is 'encrypted'. What makes this question so important is how is the data encrypted? Because only when data is encrypted end-to-end, it is truly inaccessible to the online service as well as to other third parties. Only then the service can be considered as offering secure email. That's why simply "encrypting" data is not sufficient, the data must be encrypted end-to-end.
Many email services, even secure ones, use third-party tech like Dovecot, Roundcube and others to build their own products. Every time a so called secure service uses third-party applications, it becomes more difficult to secure said service. The reason is simple: Every service included in the code executes code. Any services' security can't get better than that of its dependencies. Every dependency to third party code must be maintained and security updates need to be applied immediately. In addition, every third-party service can potentially track the users, send data to its own servers etc. That’s why we at Tutanota only use open source code that we have vested ourselves before using it. This way we make sure ourselves that the open source tools Tutanota does use are secure: We regularly run security reviews of these tools as well as of our own clients, for instance when we pushed our desktop clients out of beta.
Of course, we at Tutanota can't re-invent the wheel either. But we have built our entire clients - web, Android, iOS, and all desktop clients on our own. Plus, we have a strong focus on security in our whole development workflow. All developers share the same DNA: privacy and security first.
One main differentiation of Tutanota is that we build all major parts of Tutanota ourselves, even outside of the core email functionality such as our captcha, our push notification service on Android and more.
Only with open source - of our own clients and of the software that Tutanota depends on - tech-savvy people can audit the code and verify that Tutanota is doing what we promise: Securing your private emails to the maximum.
Check here why we recommend to choose our secure desktop clients for Linux, Windows and macOS and why it is so important that we have built our own open source captcha as well as an alternative to Google Push on Android.
Kierujemy się koncepcją "bezpieczeństwo przede wszystkim".
︎
Oferując bezpieczną usługę poczty e-mail, ludzie ufają, że twoje zabezpieczenia będą niezawodne. Dla nas oznacza to, że nigdy nie może być kompromisu, jeśli chodzi o bezpieczeństwo. Bezpieczeństwo musi być wbudowane w kod, aby można było łatwo dodać do niego użyteczność - nie na odwrót.
︎
Koncepcja "bezpieczeństwo przede wszystkim" doprowadziła do kilku decyzji rozwojowych, które dziś gwarantują najwyższy poziom bezpieczeństwa Tutanota:︎
︎
Encrypted mailbox, calendar, contacts.
From the start, we at Tutanota made sure that as much data as possible is E2E encrypted. Tutanota was the world's first end-to-end encrypted email provider and, to this day, it is the email service that encrypts more data than any other.
Tutanota encrypts all data by default: Email, calendars, contacts. The end-to-end encryption provided by Tutanota ensures that your data is secure and private, even if it falls into the wrong hands.
Tutanota's servers only store the encrypted data, and the decryption key is only available to the user. This ensures that even if your internet connection was intercepted or in the extremely unlikely scenario that someone were to hack our servers, your data remains secure.
With its built-in encryption Tutanota makes security easily accessible to private users and businesses all over the world. To decrypt your data, you simply login to your secure email address with your password, that’s it. You can easily login via a web browser, via the Tutanota apps for Android and iOS, or via the Tutanota desktop clients for Windows, macOS and Linux.
Jak wysłać bezpieczną wiadomość e-mail do każdego.
︎
Tutanota umożliwia wysyłanie bezpiecznych wiadomości e-mail (szyfrowanych E2E) do każdego, kto posiada wspólne hasło. Oznacza to, że wiadomość jest szyfrowana na urządzeniu nadawcy i może być odszyfrowana tylko przez urządzenie odbiorcy. Możesz łatwo wymieniać poufne rozmowy lub pliki online, wiedząc, że wszystkie dane wysyłane za pośrednictwem Tutanota są bezpiecznie szyfrowane metodą od końca do końca. Możesz łatwo wysyłać zaszyfrowane wiadomości e-mail do odbiorców zewnętrznych, definiując hasło. Hasło jest ważne dla wszystkich wiadomości e-mail wymienianych z tą osobą, nie ma potrzeby definiowania nowego hasła dla każdej wiadomości e-mail, jak w przypadku innych bezpiecznych dostawców.
Zero-knowledge calendar.
Tutanota comes with an end-to-end encrypted calendar that lets you schedule and store all your appointments confidentially. Our calendar is an outstanding achievement because not only all data is encrypted, but also the reminders are E2E encrypted. Even the time when a notification is sent to the user is obscured from our servers so that we remain in the dark about all our users’ appointments.
Zabezpieczanie protokołu e-mail︎
︎
Wysyłając wiadomości e-mail za pomocą Tutanota, wybierasz najbezpieczniejszą opcję, ponieważ Tutanota umożliwia automatyczne szyfrowanie wiadomości e-mail metodą od końca do końca.
︎
Czasami jednak możesz chcieć wymieniać niezaszyfrowane wiadomości e-mail ze swoimi kontaktami, które nie korzystają z Tutanoty, gdy udostępnianie im hasła byłoby niewygodne. Znacznie trudniej jest zabezpieczyć takie wiadomości e-mail, ponieważ w takim przypadku dostawca poczty może zaszyfrować tylko transmisję, a nie same dane. Poza tym zaangażowane są inne usługi, takie jak dostawca poczty e-mail odbiorcy, który musi upewnić się, że transmisja jest bezpiecznie zakończona.︎
︎
Aby jak najlepiej zabezpieczyć niezaszyfrowane wiadomości e-mail, przestrzegamy najwyższych możliwych standardów protokołu poczty elektronicznej SMTP.︎
︎
**Tutanota obsługuje MTA-STS. Standard ten powinien być już obsługiwany przez wszystkie usługi poczty e-mail, ponieważ jest on dla wiadomości e-mail tym, czym ścisły HTTPS jest dla strony internetowej: Wymusza szyfrowanie transportu (TLS) wszędzie tam, gdzie TLS jest możliwy.**︎
︎
Tutanota obsługuje również SPF, DKIM i DMARC. Te trzy protokoły są niezbędne do zabezpieczenia infrastruktury przed włamaniami z phishingu i spamu.︎
︎
Tutanota używa ścisłych zasad CSP (Content Security Policy), mechanizmu oczyszczania HTML do wyświetlania nieznanych treści (w wiadomościach e-mail) w celu zapobiegania atakom XSS i domyślnie nie ładuje zewnętrznych treści z innych serwerów (zdjęć i filmów w wiadomościach e-mail). Użytkownik może wybrać wyświetlanie treści zewnętrznych za pomocą jednego kliknięcia lub dotknięcia, jeśli ufa nadawcy.︎
︎
Sprawdź tutaj, jak dobrze Tutanota wypada w Securityheaders.io.
Tutanota never transmits your password to the server.
When you login to your secure mailbox, Tutanota hashes and salts your password before transmitting the hash to our servers. It is impossible to derive the actual password from this hash, so no one can know your password, not even we at Tutanota. To protect your password, we use bcrypt and SHA256.
Tutanota also provides two-factor authentication (2FA) to add an extra layer of security. To secure your login credentials, you can use TOTP or U2F. We recommend using U2F with a security device as this is the most secure form of two-factor authentication. This ensures that only the authorized user can access their account.
Check out our online security guide on how to keep your emails safe from hackers.
Tutanota wykorzystuje architekturę zero-knowledge, co oznacza, że dane użytkownika nigdy nie są przechowywane w postaci zwykłego tekstu na serwerach Tutanota. Serwery Tutanota przechowują tylko zaszyfrowane dane, a klucz deszyfrujący jest dostępny tylko dla użytkownika. Gwarantuje to, że nawet jeśli serwery Tutanota zostaną zhakowane, dane pozostaną bezpieczne.
The European GDPR requires companies to secure emails containing sensitive data of EU citizens.
Businesses are required to safeguard personal data, even when in transit. Save time and money by hosting all your business emails encrypted on Tutanota's secure servers. With Tutanota there’s no need to use a plugin or a complicated encryption software on top of a bloated enterprise email solution that used to be a good fit for businesses a decade ago.
Email encryption guarantees GDPR compliance, and Denmark was the first EU country officially stating that companies must protect sensitive personal data in emails with proper end-to-end encryption because of the GDPR. Tutanota offers the most secure email solution for businesses with full GDPR-compliance.
Tutanota follows the principles of data minimization & privacy by design.
We are responsible for the protection of your personal data, and we take this responsibility very seriously. Therefore:
Tutanota is based on the data privacy principles of "data minimization" and "privacy by design".
All user data is stored end-to-end encrypted in Tutanota (except for metadata such as email addresses of senders and recipients of emails as this information is needed by the email protocol to deliver the email to the correct address).
We have technical and organizational measures in place which protect your data to the maximum extent.
Tutanota enables you to place an encrypted contact form - Secure Connect - on your website so that people interested in your company can easily get in touch with you E2E encrypted.
Tutanota provides an Order Processing Agreement with legally binding data protection guarantees to help you demonstrate your compliance with GDPR.
Please read our full privacy statement for details.
Our built-in encryption and the fact that we enable you to send an encrypted email to any recipient in the world make Tutanota a perfect fit when looking for the best secure email for your business . Tutanota helps you easily send sensitive personal data end-to-end encrypted, thus, making sure that your company is GDPR-compliant.
Read our blog to find out how Tutanota can help your business achieve GDPR compliance.
Germany has one of the strictest data protection laws.
Data privacy regulations in the European Union (EU) are among the strictest in the world, and among all European member states, Germany has one of the strongest policies: the Federal Data Protection Act (Bundesdatenschutzgesetz). The EU General Data Protection Regulation (GDPR) was in large parts designed based on the German Federal Data Protection Act.
This law protects users of internet services. It puts the user in charge of what should be done with their data: Companies (=we) are not allowed to collect any personal information without express permission from an individual (=you), (e.g. name, date of birth, IP address).
In addition, in Germany there is no law that could force us to submit to a gag order or to implement a backdoor.
You can find details about German data protection laws on our blog and in our Transparency Report.
Tutanota przechowuje wszystkie dane zaszyfrowane w wysoce bezpiecznych centrach danych w Niemczech.
Wszystkie dane w Tutanota są przechowywane w całości zaszyfrowane na naszych własnych serwerach w centrach danych z certyfikatem ISO 27001 w Niemczech.
Nikt nie ma dostępu do naszych serwerów z wyjątkiem naszych stałych administratorów, którzy przed uzyskaniem dostępu muszą przejść uwierzytelnianie wieloskładnikowe. Wszystkie systemy produkcyjne są monitorowane 24/7 pod kątem nieautoryzowanego dostępu i nadzwyczajnej aktywności.
Tutanota is an anonymous email service that does not track you.
Our business model is different from most email services: Due to the encryption, we can not scan your emails. We do not track you. We do not send targeted advertisements to your mailbox. This means that your data is not used for any other purpose than to provide email and calendar services. This ensures that your data is never shared with third-party advertisers or other entities, which could compromise your privacy.
By default, Tutanota does not log IP addresses when you login or when you send an email. Upon registration you do not need to provide any personal data (e.g. no phone number is required), even when you register via the Tor browser. Tutanota strips the IP addresses of emails sent from the mail headers so that your location remains unknown. Despite all these protections, you might still want to keep your IP address hidden even from us, which is why we will never add a VPN or a browser to our offer. Particularly offering a VPN does not make any sense because if we did, we as the email provider would still be able to find out users’ original IP addresses if they connected via this VPN. For privacy reasons, it is better to keep such services separated.
Tutanota is an email service built with privacy at its heart.
Companies love email for marketing campaigns. Because email by default does not respect your privacy. When you receive a marketing newsletter, the email usually loads external content (e.g. images, videos). In this instance you are being tracked: IP address, browser you are using, and more information is being transmitted to the sender.
Tutanota offers an email service that automatically protects from those tracking methods:
Tutanota blocks images by default. No external content is loaded when you open an email unless you actively allow this.
Tutanota strips all header information (IP address) from emails sent to protect your privacy.
Tutanota warns you when the technical sender differs from the from sender. To fake the from sender is a typical method used in phishing attacks. On our blog you can find more tips on how to prevent email phishing.
Check if anyone has accessed your encrypted Tutanota mailbox.
Tutanota lets you check active and closed sessions as an opt-in feature. This allows you to verify that no one but yourself has logged into your account. Closed sessions are automatically deleted after one week. Tutanota’s session handling also enables you to close sessions remotely. When you lose your mobile phone and you are still logged in with the Tutanota app, you can close this session from any other device. By closing the session remotely, you make sure that no one can access your secure emails on the lost phone.
IP addresses of open and closed sessions are always stored encrypted and automatically deleted after one week. Due to the encryption only you can access this information. We at Tutanota have absolutely no access to this information.
**Darmowe i otwarto-źródłowe e-maile dla każdego.**︎
︎
Tutanota koncentruje się na bezpieczeństwie i prywatności. Dla nas otwarte oprogramowanie jest niezbędne do osiągnięcia obu tych celów. Opublikowaliśmy klienta internetowego Tutanota, aplikacje klientów desktopowych Tutanota, a także aplikacje na Androida i iOS jako oprogramowanie z otwartym kodem źródłowym na GitHub.︎
︎
W ten sposób każdy może sprawdzić kod i zweryfikować, czy w bazie kodu nie ma błędów lub luk w zabezpieczeniach. Dzięki otwartemu oprogramowaniu potencjalne błędy mogą zostać zauważone i naprawione znacznie szybciej niż w przypadku aplikacji z zamkniętym kodem źródłowym.
Tutanota is different from most email providers: When we first started developing Tutanota, we started with the encryption protocol. While most services first build a product and then try to add security on top, we did it the other way around: Security came first, and it always comes first in all our development decisions.
This is why Tutanota excels in security and privacy. With its end-to-end encryption, two-factor authentication, open source code, and zero-knowledge architecture we ensure that your data is secure and private, whether you use Tutanota as your business email of choice or as a private user.