{"id":1515,"date":"2020-01-29T11:35:54","date_gmt":"2020-01-29T10:35:54","guid":{"rendered":"http:\/\/65.108.60.219\/?p=1515"},"modified":"2025-04-25T12:06:53","modified_gmt":"2025-04-25T10:06:53","slug":"encrypted-e-mail-for-private-use","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/encrypted-e-mail-for-private-use","title":{"rendered":"Encrypted e-mail for private use. All you need to know"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">During one of the online seminars conducted by CyberForces and Xopero on the topic of Internet security and social engineering, numerous attendees asked me to outline how encrypted e-mail works and how can one start utilizing it in their day-to-day operations. Since the topic is very broad, I thought this text might be a good introduction to the concept of using encrypted e-mail systems.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Digital transfer of private data<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Today it\u2019s nearly impossible to utilize key Internet services without having an e-mail account. Our e-mail addresses, in fact, became verification methods for some services. For example, when we lose a password to a service, we usually can reset it by having a special link e-mailed to our address. The taxes we pay are linked to our e-mail addresses, as we utilize online tax services such as Turbotax, TaxAct, H&amp;R Block Online Edition (and numerous others), which utilize e-mail as means of authentication. The tax forms themselves have a special field where the taxpayer can enter their e-mail address, so the government can send updates on tax returns. Consequently, e-mail is a critical hub for all important notifications about our business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, the side effect of digitizing so much of our critical communication is the fact that identity theft has become easier than ever. Anyone who gains access to the contents of our mailbox\u00a0 has a wealth of data about us and can easily utilize this information to steal our identity. Meanwhile, the e-mail platform has not received much of an upgrade since the early 1990s. In fact, the basic principle of e-mail has not changed much over the course of three decades, with only a few modifications to the traditional e-mail protocols.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Standard e-mail security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">It would be wrong to say that standard e-mail is outdated and insecure. In fact, most of the time e-mail is very secure, as protocols such as IMAP, SMTP, and POP3 are secured with SSL, TLS or STARTTLS, thus making sure that the authentication process is done in a secure, encrypted manner. Every major e-mail provider uses encryption for transfer and authentication of an e-mail; in fact, it would be hard to find a system that still sends authentication data in a plain text format.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nonetheless, there\u2019s an intrinsic problem with e-mail, and it has to do with the fact that by default, our messages are stored in plain text format. What this means is that while the authentication process is relatively secure, the storage method is completely unprotected. From the administrator\u2019s point of view, accessing someone\u2019s e-mail data is as easy as opening the text file on the computer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For some users, ramifications of this design flaw can be great. Let\u2019s take security, for example. While a user might do their best to keep their devices encrypted and secured, if someone gains access to the provider\u2019s credentials, all users data is at risk. With the profitability of identity theft, each compromised e-mail account has its worth on a black market \u2013 and there are plenty of \u201centrepreneurs\u201d happy to mine this data for a potential exploit. Meanwhile, a single mailbox often has highly confidential information related to our identity, our business or personal life.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Encrypted e-mail<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">With all the problems of \u2018traditional\u2019 e-mail outlined above, one might be inclined to turn to message content encryption in order to solve this weak-point. In many ways, this is a logical and reasonable solution. However, for those trying to upgrade, lack of ubiquity is the problem: most popular e-mail providers simply do not provide encrypted e-mail services, and even when they do, sending and receiving mail can be\u2026 unergonomic at least.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are inclined to start utilizing an encrypted e-mail service, one of the easiest ways to jump on the bandwagon would be to utilize an encrypted e-mail provider. Over the last few years several companies came out with a reliable, standard and encrypted e-mail service offering \u2013 some even for free.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1516 size-large\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/proton-encrypted-mails-700x379.png\" alt=\"protonmail encrypted mails\" width=\"700\" height=\"379\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1518 size-large\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/tutanota-encrypted-mails-700x342.png\" alt=\"tutanota encrypted mails\" width=\"700\" height=\"342\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Two of the most prominent encrypted e-mail providers on the market today are <a href=\"https:\/\/protonmail.com\/\">Protonmail<\/a> (Switzerland) and <a href=\"https:\/\/tutanota.com\/\">Tutanota<\/a> (Germany). As one may notice, obtaining an encrypted mailbox is just as easy as signing up for a regular e-mail account from Gmail, for example. After the signup process, we\u2019re presented with a clean user interface, and we can start e-mailing right away. Both Protonmail and Tutanota combine standard with encrypted e-mail service, so users can seamlessly transition into the more secure technology as they utilize the new mailbox in their day-to-day operations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, whereas sending e-mails between two encrypted providers works out of the box, sending an encrypted e-mail to a non-encrypted mailbox ends up with an extra step in the reading process.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When a user of an encrypted service sends an encrypted message to a \u2018standard\u2019 user, he\/she will only receive an invitation to read the message through their Internet browser. Clicking on a special link will forward the user to a password form, where they will have to enter a password earlier obtained from the sender. Here it\u2019s important to notice that giving someone the password to a message should be ideally be done through a different means of communication \u2013 for example, during a phone conversation. When the receiving party is done reading the message, they will have the opportunity to reply in the same window. Once the \u201csend\u201d button is clicked, the message is encrypted and sent off to the receiving user.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While this additional step might not constitute a sizable inconvenience for the price of additional security, not all users are inclined to switch, however. This is partly due to the fact how ubiquitous traditional e-mail has become in our daily life: many of us have dozens, if not hundreds of services registered to our current e-mail address and switching to an entirely new address might not only be highly problematic, but downright impossible. So, can a standard e-mail account be used for sending encrypted messages?<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Using standard e-mail accounts to send and receive encrypted messages<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In short \u2013 yes, it\u2019s possible to use standard e-mail accounts for sending and receiving encrypted e-mails. However, this process usually entails downloading software, manually encrypting and decrypting e-mail messages.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s dig in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We begin with downloading a piece of software \u2013 such as Kleopatra \u2013 which will allow us to create a pair of keys: private and public. A private key is made specifically for one user and should be kept in secrecy at all times. This key is used in the process of decrypting received messages and should be treated as a password \u2013 that is, whoever has this key, they have access to all our message data. A public key, on the other hand, is a complimentary key to the private one and as the name suggests, can be published freely on the Internet. By using our public key, someone sending us a message will be able to encrypt it in such a manner, that only we will be able to decipher it. It\u2019s important to point out that keys are made in such a way that it\u2019s impossible to decrypt a message only by using someone\u2019s public key.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By exchanging their public keys and retaining the private ones to themselves, users can compose and send encrypted messages in plain text format. With the private key in hand, the appropriate user will be able to decode the message. The administrator of the service, on the other hand, will only see nonsensical, scrambled text information that will bear no useful data.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1509 size-large\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/kleopatra-szyfrowanie-maili-700x624.png\" alt=\"\" width=\"700\" height=\"624\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Kleopatra<\/span><\/i><\/p>\n<h2><span style=\"font-weight: 400;\">Making life easier with encrypted e-mail<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Although there are countless tutorials and YouTube videos on how to use Kleopatra and similar software, for the purposes of this text, it makes little sense to publish step-by-step instructions. Regardless of which option we choose, there is a great amount of literature explaining the process of setting up and using the software to generate keys and encrypt\/decrypt messages. Moreover, the logical foundations of how key management and message encryption software works is very similar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, as one may notice, the process of using standard e-mail accounts to deliver encrypted e-mails is by far more complicated, than composing an unencrypted message on a traditional e-mail service. This is the reason why there are very useful browser extensions that can help automate the process \u2013 such as\u00a0 Mailvelope and FlowCrypt. Additionally, popular e-mail clients such as Microsoft Outlook and Mozilla Thunderbird already have similar plugins available, as well as standardized methods of encryption and sender identity verification.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to corporate customers \u2013 using encrypted e-mail inside a business entity can be quite uncomplicated, as long as the IT department rolls out appropriate protocols and authentication procedures company-wide. Microsoft Outlook, for example, has been supporting this technology for years, so the process of transitioning into all internal e-mail encrypted by default has very little technological and financial constraints. The security benefits of this solution are definitely worth the upgrade.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During one of the online seminars conducted by CyberForces and Xopero on the topic of Internet security and social engineering, numerous attendees asked me to outline how encrypted e-mail works and how can one start utilizing it in their day-to-day operations. Since the topic is very broad, I thought this text might be a good [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":1520,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-1515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guide"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Encrypted e-mail for private use. All you need to know - CyberForces<\/title>\n<meta name=\"description\" content=\"Our expert reveals all the secrets of using encrypted e-mail. You will find out how to cypher and decypher e-mails and make your mailbox safe!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encrypted e-mail for private use. All you need to know - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Our expert reveals all the secrets of using encrypted e-mail. You will find out how to cypher and decypher e-mails and make your mailbox safe!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-29T10:35:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T10:06:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/ENCRYPTED-EMAIL.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pawe\u0142 Wa\u0142uszko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pawe\u0142 Wa\u0142uszko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany\"},\"author\":{\"name\":\"Pawe\u0142 Wa\u0142uszko\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#\\\/schema\\\/person\\\/12153b64ec1142a80a25bcc96b281a8e\"},\"headline\":\"Encrypted e-mail for private use. All you need to know\",\"datePublished\":\"2020-01-29T10:35:54+00:00\",\"dateModified\":\"2025-04-25T10:06:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany\"},\"wordCount\":1505,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/ENCRYPTED-EMAIL.png?wsr\",\"articleSection\":[\"Guide\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany\",\"url\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany\",\"name\":\"Encrypted e-mail for private use. All you need to know - CyberForces\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/ENCRYPTED-EMAIL.png?wsr\",\"datePublished\":\"2020-01-29T10:35:54+00:00\",\"dateModified\":\"2025-04-25T10:06:53+00:00\",\"description\":\"Our expert reveals all the secrets of using encrypted e-mail. You will find out how to cypher and decypher e-mails and make your mailbox safe!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany#primaryimage\",\"url\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/ENCRYPTED-EMAIL.png?wsr\",\"contentUrl\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/ENCRYPTED-EMAIL.png?wsr\",\"width\":1200,\"height\":630,\"caption\":\"encrypted email\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/email-standardowy-czy-szyfrowany#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/cyberforces.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encrypted e-mail for private use. All you need to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberforces.com\\\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberforces.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\\\/\\\/cyberforces.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/CyberForces-logo.png\",\"contentUrl\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/TestArmyCyberForces\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cyberforcescom\\\/\",\"https:\\\/\\\/www.instagram.com\\\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/#\\\/schema\\\/person\\\/12153b64ec1142a80a25bcc96b281a8e\",\"name\":\"Pawe\u0142 Wa\u0142uszko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"url\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"contentUrl\":\"https:\\\/\\\/cyberforces.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"caption\":\"Pawe\u0142 Wa\u0142uszko\"},\"description\":\"Business Development Manager i Ekspert ds. Bezpiecze\u0144stwa. Do\u015bwiadczony mened\u017cer w bran\u017cy IT, kt\u00f3ry swoje do\u015bwiadczenie zdobywa\u0142 m.in. w Dolinie Krzemowej; entuzjasta oprogramowania open - source.\",\"url\":\"https:\\\/\\\/cyberforces.com\\\/en\\\/author\\\/pwaluszko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encrypted e-mail for private use. All you need to know - CyberForces","description":"Our expert reveals all the secrets of using encrypted e-mail. You will find out how to cypher and decypher e-mails and make your mailbox safe!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany","og_locale":"en_US","og_type":"article","og_title":"Encrypted e-mail for private use. All you need to know - CyberForces","og_description":"Our expert reveals all the secrets of using encrypted e-mail. You will find out how to cypher and decypher e-mails and make your mailbox safe!","og_url":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2020-01-29T10:35:54+00:00","article_modified_time":"2025-04-25T10:06:53+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/ENCRYPTED-EMAIL.png","type":"image\/png"}],"author":"Pawe\u0142 Wa\u0142uszko","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pawe\u0142 Wa\u0142uszko","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany"},"author":{"name":"Pawe\u0142 Wa\u0142uszko","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e"},"headline":"Encrypted e-mail for private use. All you need to know","datePublished":"2020-01-29T10:35:54+00:00","dateModified":"2025-04-25T10:06:53+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany"},"wordCount":1505,"commentCount":0,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/ENCRYPTED-EMAIL.png?wsr","articleSection":["Guide"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany","url":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany","name":"Encrypted e-mail for private use. All you need to know - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/ENCRYPTED-EMAIL.png?wsr","datePublished":"2020-01-29T10:35:54+00:00","dateModified":"2025-04-25T10:06:53+00:00","description":"Our expert reveals all the secrets of using encrypted e-mail. You will find out how to cypher and decypher e-mails and make your mailbox safe!","breadcrumb":{"@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/ENCRYPTED-EMAIL.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/ENCRYPTED-EMAIL.png?wsr","width":1200,"height":630,"caption":"encrypted email"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/email-standardowy-czy-szyfrowany#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Encrypted e-mail for private use. All you need to know"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e","name":"Pawe\u0142 Wa\u0142uszko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","caption":"Pawe\u0142 Wa\u0142uszko"},"description":"Business Development Manager i Ekspert ds. Bezpiecze\u0144stwa. Do\u015bwiadczony mened\u017cer w bran\u017cy IT, kt\u00f3ry swoje do\u015bwiadczenie zdobywa\u0142 m.in. w Dolinie Krzemowej; entuzjasta oprogramowania open - source.","url":"https:\/\/cyberforces.com\/en\/author\/pwaluszko"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=1515"}],"version-history":[{"count":4,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1515\/revisions"}],"predecessor-version":[{"id":250994,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1515\/revisions\/250994"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media\/1520"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=1515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=1515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=1515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}