Click to copy, then share by pasting into your messages, comments, social media posts and websites.
Click to copy, then add into your webpages so users can view and engage with this video from your site.
Report Content
We also accept reports via email. Please see the Guidelines Enforcement Process for instructions on how to make a request via email.
Thank you for submitting your report
We will investigate and take the appropriate action.
Best secure and private email services review - guide to Gmail alternatives and encrypted email
Secure your privacy and claim a new encrypted email at these secure and private email services. Follow my guide to gmail alternatives and end-to-end encryption using private email providers as part of degoogleify campaign.
Tutanota.com review 5:20
Mailfence.com review 8:20
Disroot.org review 10:42
Protonmail.com review 12:54
End-to-end encryption protects your email messages from being stolen by hackers, read by spies, or used by Google or Microsoft for targeted advertising. Encrypted email is essential for protection of your online privacy, security, and digital rights. Mainstream email providers like Yahoo Mail, Gmail, or Hotmail, don't offer you end-to-end encryption because that would jeopardize their business model.
However, your personal email should be completely private and not read by companies to make a profit off of you. Luckily, there are plenty of gmail/yahoo/hotmail alternatives that keep your messages private and secure from prying eyes of advertisers and governments.
Don't expose your private email messages to hackers, cyber criminals, identity thieves, and governments around the world you can’t trust. Sign up with one of these secure and private email providers for an encrypted email.
All of these private email services offer free basic entry for account creation, end-to-end encryption using asymmetric public key cryptography, public cause and activism, anonymous sign-up.
What is end-to-end encryption, public key cryptography and asymmetric encryption?
Asymmetric encryption is the one where users generate two keys to encrypt their data – a private key, and a public key. When someone wants to contact you securely, they use your public key to encrypt the message. To read the message when you receive it, you decrypt it with your private key. Since public keys are available to everyone, you need to make sure nobody tried to spoof your identity using your public key to impersonate you and communicate with your contacts.
Credits:
Instrumentals Real Chill and Spite, Momentum, Faded Nights, Now by https://www.youtube.com/user/CHUKImusic
Chill Wave and Shadowlands 4 by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
EFF Flickr images
Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne
Help us fight for our digital rights: https://act.eff.org/
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Category | Science & Technology |
Sensitivity | Normal - Content that is suitable for ages 16 and over |
Playing Next
Related Videos
3 weeks ago
The Dangerous Propaganda Of Techno-Optimism
1 month, 1 week ago
The Fallacy Of Our World In Data
2 months ago
The Blackrock Conspiracy Debunked
5 months, 3 weeks ago
ACTUALLY! Android is more private than the iPhone!
7 months, 1 week ago
How The Most Corrupt Bank In The World Got Away With Everything
8 months, 4 weeks ago
Warning - This video exceeds your sensitivity preference!
To dismiss this warning and continue to watch the video please click on the button below.
Note - Autoplay has been disabled for this video.