1 00:00:01,490 --> 00:00:08,180 Now in the previous lectures we covered different types of email providers within each type. 2 00:00:08,180 --> 00:00:16,060 There are a number of providers and each one of these providers could have their own pros and cons therefore 3 00:00:16,360 --> 00:00:22,390 at this stage I wouldn't blame you if you feel a little bit confused or find it a little bit difficult 4 00:00:22,390 --> 00:00:25,150 to pick which is best for you. 5 00:00:25,420 --> 00:00:31,810 Now the reason why I covered so many different types because I think each one of these types is different 6 00:00:31,810 --> 00:00:33,430 from the other and no one. 7 00:00:33,430 --> 00:00:40,660 All of these types can be very very useful because you'll be able to pick which is best based on your 8 00:00:40,660 --> 00:00:42,190 scenario. 9 00:00:42,220 --> 00:00:49,450 So as I mentioned at the start of the section when you want to pick an email service you want to keep 10 00:00:49,450 --> 00:00:51,470 two main things in your mind. 11 00:00:51,520 --> 00:00:55,470 Why do you want to use this service and what's your threat model. 12 00:00:55,540 --> 00:01:00,760 Who might be trying to anonymize you or discover your location. 13 00:01:00,760 --> 00:01:07,750 Keeping that in mind and in order to revise and make it easier for you to pick a good email provider 14 00:01:07,840 --> 00:01:16,640 based on your scenario I made this simple table that summarizes everything we talked about so far. 15 00:01:16,780 --> 00:01:25,180 Now the main thing to keep in mind is as we go down in this table the provider type will be more private 16 00:01:25,330 --> 00:01:30,620 more secure and therefore more anonymous but it will have less features. 17 00:01:30,640 --> 00:01:36,590 So like I said it all comes down to why you want to use it for and what's your threat model. 18 00:01:36,610 --> 00:01:44,110 So the first type of providers we had luck on were the common services such as Gmail Hotmail Yahoo mail 19 00:01:44,110 --> 00:01:45,590 and all of that. 20 00:01:45,820 --> 00:01:52,900 These email providers can send emails to the clear net and to the darknet as we saw they all use javascript 21 00:01:52,930 --> 00:01:55,020 so they are less secure. 22 00:01:55,060 --> 00:02:00,930 We know that the heavily try Q and log everything you do so they are not private. 23 00:02:00,940 --> 00:02:06,010 Like I said if you really want to use these you want to make sure that you use fake identity and never 24 00:02:06,010 --> 00:02:14,630 communicate with your own email addresses or any other email addresses that can link to your real identity. 25 00:02:14,830 --> 00:02:21,530 They do not offer a hidden online service link and they do use ETP as encryption. 26 00:02:21,580 --> 00:02:28,780 So these were the base then the other example we had was the temporary emails which in my opinion can 27 00:02:28,780 --> 00:02:34,990 be very very useful in so many scenarios like we said they don't require any personal information to 28 00:02:34,990 --> 00:02:35,630 sign up. 29 00:02:35,710 --> 00:02:36,910 There is no sign up. 30 00:02:36,910 --> 00:02:42,550 You literally get an inbox straight away and you can use it so you can have unlimited number of emails 31 00:02:42,820 --> 00:02:45,390 because you're never asked to sign up. 32 00:02:45,520 --> 00:02:50,380 There are more private and more anonymous than the normal email providers. 33 00:02:50,470 --> 00:02:57,100 They do use JavaScript So again they're not as secure as possible they might be log in you put the cool 34 00:02:57,100 --> 00:03:03,700 thing is some of them offer a hidden service so you never need to exit the Tor network when you're using 35 00:03:03,700 --> 00:03:08,520 them and they also use hash TTP as to add an extra layer of encryption. 36 00:03:08,560 --> 00:03:12,170 So this is a really really good option if you know what you're doing. 37 00:03:12,180 --> 00:03:17,740 If you just want a temporary email to send to send something quickly to receive something quickly and 38 00:03:17,740 --> 00:03:24,220 this and this will actually be destroyed once you're done with it so it can be anonymous enough it can 39 00:03:24,220 --> 00:03:26,020 be great in so many scenarios. 40 00:03:26,020 --> 00:03:34,120 Again if you're trying to just bypass a registration form and so on the next email providers that we 41 00:03:34,120 --> 00:03:40,750 had to look on where the privacy focused or what I called hybrid services so they can communicate with 42 00:03:40,750 --> 00:03:43,080 clear net and darknet services the whole. 43 00:03:43,180 --> 00:03:45,460 They have a lot of nice features. 44 00:03:45,550 --> 00:03:51,790 What really differentiates them from the common services such as Gmail Yahoo and all of that is the 45 00:03:51,790 --> 00:03:52,970 fact that they will not try. 46 00:03:52,980 --> 00:03:56,170 Q They want to be log in your movement. 47 00:03:56,170 --> 00:03:58,360 They don't require personal information. 48 00:03:58,360 --> 00:04:01,750 Like I said these are privacy focused. 49 00:04:01,750 --> 00:04:04,240 Some of them will even have a darknet address. 50 00:04:04,270 --> 00:04:11,220 So again you can access them without exiting the Tor network which will improve your privacy and anonymity. 51 00:04:11,230 --> 00:04:13,720 Some of them use end to end encryption again. 52 00:04:13,750 --> 00:04:19,600 In our example proton mail uses end to end encryption so like I said even if they wanted to see what 53 00:04:19,600 --> 00:04:22,420 you're doing they won't be able to see it. 54 00:04:22,420 --> 00:04:27,550 The only problem with these providers is the fact that they are real proper companies. 55 00:04:27,550 --> 00:04:34,240 They have servers on the clear net and they have complied to court orders and disclosed information 56 00:04:34,270 --> 00:04:36,880 about their users previously. 57 00:04:36,920 --> 00:04:42,760 Now like I said they keep no logs and they require no personal information on the use end to end encryption. 58 00:04:42,760 --> 00:04:47,760 So the amount of information they can share is limited because they don't know a lot. 59 00:04:47,800 --> 00:04:55,270 But again the fact that they do comply sometimes puts them in second place in terms of anonymity. 60 00:04:55,270 --> 00:05:00,460 The other thing that you want to keep in mind is the fact that they require javascript so when you use 61 00:05:00,460 --> 00:05:07,030 them you need to have your security settings in the Tor browser to medium which is not very secure. 62 00:05:07,030 --> 00:05:13,930 But if you're using proton mail or any other reputable email provider and if that email provider is 63 00:05:13,930 --> 00:05:20,070 using his TTP as then it is secure enough to enable javascript and the medium level. 64 00:05:20,470 --> 00:05:25,720 But again this is still not as secure and as anonymous as possible. 65 00:05:25,720 --> 00:05:31,720 This led us to the last email providers which are completely available on the darknet. 66 00:05:31,720 --> 00:05:34,480 They have no clear net addresses. 67 00:05:34,480 --> 00:05:37,990 So again when you use them you never exited your network. 68 00:05:37,990 --> 00:05:41,230 This increases your privacy and anonymity. 69 00:05:41,230 --> 00:05:47,740 They also do not require javascript so you can put your security settings to the highest where javascript 70 00:05:47,740 --> 00:05:50,980 and all of the other features of the browser are disabled. 71 00:05:50,980 --> 00:05:58,390 That can be used to reduce your security or the anonymize you some of these providers allow you to communicate 72 00:05:58,390 --> 00:06:02,000 with both clear net and darknet addresses such as allude. 73 00:06:02,080 --> 00:06:08,680 And we also had an example of Tor box which is a provider that only allows you to communicate with darknet 74 00:06:08,710 --> 00:06:09,540 addresses. 75 00:06:09,550 --> 00:06:16,000 Now this is great because like I said it keeps you limited and it keeps you as anonymous as possible. 76 00:06:16,000 --> 00:06:19,270 Now it goes without saying that none of these services struck you. 77 00:06:19,270 --> 00:06:26,530 None of them keep logs because they run as online services they make full use of the privacy provided 78 00:06:26,530 --> 00:06:27,440 by Tor. 79 00:06:27,520 --> 00:06:34,900 And on top of that some providers such as elude provides end to end encryption and even personally encrypt 80 00:06:34,990 --> 00:06:42,840 the storage that stores your emails and again because these are darknet services the location of their 81 00:06:42,840 --> 00:06:50,100 servers is unknown and they're less likely to comply with court orders or to get influenced by government 82 00:06:50,160 --> 00:06:51,650 agencies and so on. 83 00:06:52,970 --> 00:06:59,960 Now like I said the examples that I'm giving you in here these are just single examples of the categories 84 00:06:59,960 --> 00:07:01,670 that we see here on the left. 85 00:07:01,670 --> 00:07:06,800 So do your own research if you want to learn more about each one of these categories. 86 00:07:06,800 --> 00:07:09,300 And don't just take my word for granted. 87 00:07:09,350 --> 00:07:15,350 Go read the privacy policy read the history of each of these companies make sure that this company or 88 00:07:15,350 --> 00:07:20,510 this provider is the best for you for your scenario and only then start using it.