We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize the independent, professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize the independent, professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Interview: Tutanota's Arne Möhle on Encrypted Email Benefits

John Norris Technology Researcher

Looking for a higher level of email security than regular Gmail? In this interview, Tutanota Co-Founder Arne Möhle tells us about his company and the many benefits of encrypted email.

Based out of Hanover, Germany, Tutanota is an open-source, end-to-end encrypted email service. This means email text, attachments, and contacts are protected by some of the most powerful encryption standards from creation all the way through delivery. With this innovative service, users can securely manage confidential email exchanges, even if the receiving party uses old-fashioned Gmail. And did we mention its core services are free?...

Tutanota

In the interview below, Arne Möhle, Co-Founder & Developer at Tutanota, talks to us about the benefits of encrypted email and its role in protecting the personal privacy of today’s internet users.

Questions Regarding Encrypted Email and Tutanota’s Services:

Tell us a bit of Tutanota’s background. How did the service develop and what is its mission?

We at Tutanota believe that everybody needs to protect their privacy to the maximum. It is our basic human right and if three-letter agencies don’t respect this, we need to take our privacy back the only way we can: with encryption.

Freedom fighters

Your name is a combination of Latin words that translates to “secure message.” Please describe your user base. Who uses Tutanota’s secure messages the most?

Everybody who is interested in privacy, really. More and more people understand that big companies like Google and Facebook use their data and make money with it. We believe this needs to stop. In Tutanota all data is encrypted so no one but the user can access it. That’s how we see the future of the internet: secure and private.

Your service makes encrypted email as easy to use as Gmail. Please describe some choices you made to make this user friendliness a reality.

We built a system that uses encryption by default. The user doesn’t even notice that his data is being securely encrypted, that’s why it’s so easy. We do this by encrypting the users’ encryption keys with their login password. We ask all our users to keep their personal password safe because no one has access to it. We can’t even reset it. If we could, we could get access to our users’ mailboxes, but this is exactly what has to be impossible for an encryption service to be truly secure.

Where do you see the biggest threat to a person’s private data: repressive governments cracking encryption or password/identity theft?

We see it differently: We don’t protect our private data because there is a threat, but because it is our human right to keep our private communication with my friends, with my family or with my bank private - whether it is face-to-face or online doesn’t make a difference here.

You recently ran a campaign to promote and sell the UnaPhone Zenith, which is billed as the “first truly private and secure” smartphone. What makes this phone so special?

It comes with it’s own OS that does not allow any tracking. For instance, it does not run any Google services or shady apps that might track their user. Unfortunately, our smartphone have turned into personal tracking devices that hand out data to third parties all the time - mostly without us noticing. The UnaPhone Zenith does the opposite. It does not hand out data to others, but keeps your communication, your location and everything else private.

Una Zenith phone

Questions Regarding Personal Privacy

Your development team speaks passionately about the need for privacy as a cornerstone of democracy. Since you offer a free, open source service, is it fair to say this passion is what drives you forward?

Precisely. While we indeed need premium paying users to operate our service, the most substantial expense lies with our development team, rather than server space. This is why we encourage everyone to avail of our free services. As Bruce Schneier once stated, "Every time we use encryption, we protect someone who needs it to stay alive." With Tutanota, we aim for millions of people to employ encryption, thus making it exceedingly difficult for oppressive governments to surveil journalists, whistleblowers, and many others.

On the other side of the spectrum, many people think powerful privacy tools – like end-to-end encryption – help criminals and terrorists more than they help regular citizens. Do you worry about this?

No. Most recent terrorists were already known to the authorities, yet, they were not able to stop them.

Your website and Twitter feed mention several examples of repressive regimes of the past (the Gestapo, Stalin’s USSR, Mussolini’s Italy) and present (Putin’s Russia, North Korea, and Syria) as examples of what can happen in the future. Do you view encrypted email as a first line defense against such regimes?

Yes. Opposing parties in such regimes are faced with lots of difficulties. They need to be able to communicate privately.

In your view, what entity/organization challenges a person’s privacy more: internet giants like Google and Facebook or governments?

For the average person it is definitely Google and Facebook. But since you never know who is coming to power in the future - just remember Hitler was elected in a democratic way - governments can be much more dangerous for many people who don’t even think this possible right now.

Going forward, how do you see Tutanota’s role evolving in the fight for personal privacy?

We want to provide everybody with the opportunity to keep their private data private. Email here is just the start. We want to grow our service into a fully encrypted platform that lets users communicate on many levels. For instance, we plan to develop a fully encrypted calendar so that you can share appointments securely without letting third parties like Google know about them.

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize the independent, professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

John Norris worked as a tech writer, journalist, and instructional designer before turning to tech blogging in 2013. While focusing on digital security and privacy issues, he is interested in any tech area that can enrich people's lives.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Comments (1)
Chupacabra
24 Jul 2016
24 Jul 2016

“We use end-to-end encryption. That means if you encrypt some data it’s always encrypted on the client, so in the browser, in the app, and it cannot be decrypted except by the person this data was encrypted for,” says Mohle. “This decryption again happens on the client. So if you send an email this email is encrypted on your client, sent through the Tutanota service and is then decrypted on the receiving client again.

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.