There’s no such thing as fully private. For that, encryption where you control your keys is the way to go. If you’re really paranoid then Disroot or Riseup. If you like to be able to use any clients then don’t go with Proton or Tutanota. There are a lot of paid mail services, whatever you go with, you just have to read the privacy policy and know what your threat level is. Just purely paying for the services may make you feel better about your privacy but that’s not always the case. If you do something the authority doesn’t like, the provider gets hit with a subpoena and can hand you over. But again, encryption encryption.
This resource may help you, although the author is pretty paranoid and I don’t agree with a lot of their views or writing style, but I think this might be the most comprehensive list for email providers.
This is important. Without a threat model, recommendations will always be generic. Are you important enough for the NSA to dedicate resources too? You’re screwed.
What’s your threat level?
There’s no such thing as fully private. For that, encryption where you control your keys is the way to go. If you’re really paranoid then Disroot or Riseup. If you like to be able to use any clients then don’t go with Proton or Tutanota. There are a lot of paid mail services, whatever you go with, you just have to read the privacy policy and know what your threat level is. Just purely paying for the services may make you feel better about your privacy but that’s not always the case. If you do something the authority doesn’t like, the provider gets hit with a subpoena and can hand you over. But again, encryption encryption.
This resource may help you, although the author is pretty paranoid and I don’t agree with a lot of their views or writing style, but I think this might be the most comprehensive list for email providers.
This is important. Without a threat model, recommendations will always be generic. Are you important enough for the NSA to dedicate resources too? You’re screwed.