Skip to main content Link Search Menu Expand Document (external link)

E-mail

To protect email messages you send so that only the recipient can read them, you can use end-to-end encryption. End-to-end encryption is a secure method of communication that encrypts the content of your email message, so that only the sender and recipient can read it, even if the email is intercepted by a third party.

Here are some steps you can follow to use end-to-end encryption for email messages:

  • Choose an email service that supports end-to-end encryption, such as ProtonMail or Tutanota. These email services use end-to-end encryption to secure your email messages. This means that the email messages are encrypted on the sender’s device, sent over an encrypted connection, and only decrypted on the recipient’s device. The email service provider cannot access the contents of the message.
  • If the recipient uses the same email service as you, encryption will be automatically applied. Since both the sender and recipient are using the same end-to-end encrypted email service, the email messages are automatically encrypted and decrypted on both ends. This ensures that only the sender and recipient can read the message.
  • If the recipient uses a different email service, you can use an open source plugin or extension to encrypt your email, such as Enigmail or GnuPG. These plugins use OpenPGP, an open-source encryption standard that provides end-to-end encryption. When you use OpenPGP, the message is encrypted on your device using the recipient’s public key, and can only be decrypted by the recipient using their private key.
  • When you compose your email, activate the encryption feature by clicking the appropriate button or icon in the plugin. Once you activate the encryption feature, your email message is encrypted using the OpenPGP standard. This ensures that the email message is secure and can only be read by the intended recipient.
  • The recipient will then receive a notification that an encrypted email has been sent to them, and will need to enter a passphrase or decrypt the email using their private key to read it. The recipient must have the necessary encryption tools and keys to successfully decrypt the email message. This ensures that only the intended recipient can read the message.

It is important to note that both the sender and recipient must have the necessary encryption tools and keys to successfully encrypt and decrypt email messages.

G