https://reason.com/blog/2017/01/24/lavabit-snowdens-encrypted-email-service
https://lavabit.com/index.html
why would i use this over protonmail?
I wonder if I'm going to remember my old lavabit password or anything else that will be enough info to recover. Wouldn't mind having the account back even if I'm a bit wary to trust it.
>>58644921
for when proton's host has your entire network in their RBL
IT WAS JUST A SCAN YOU PRICKS
>>58644937
care to explain why you think that?
>>58644901
>use an email provider!
>NSA and other government agencies have a secret pact with said company to read your emails
>we promise we will secure your own shit for you!
I just host my own mail, I don't trust anyone but myself
>>58644965
The open source client encrypts your mail with a key that it doesn't share.
>>58644991
lavabit blew it, why would anyone trust them ever again?
>>58645002
Did you reply to my post without reading it, or are you just retarded? You do not need to trust them.
>>58644901
I'm tired of /g/'s shitty gimmicky proof of concept recommendations with an expiry date.
And I'm not only talking about email providers.
>>58645018
>You do not need to trust them.
of course i have to. oss does not instant spawn trust. first, someone has to audit the code and confirm that it's legit and second i have to trust them that they won't fuck around server side.
>>58645002
Original Lavabit did the right thing. This is probably an NSA honeypot.
>>58645056
You don't have to trust the server side, because the client side does not send plaintext mail or your key to the server.
>>58645076
maybe. anyways, i've settled with protonmail and never looked back. to think you can have a mailprovider like this within the graps of the us feds was stupid in the first place.
>>58645136
that's true, but i always have a look at who is running the server and in this instance, it's a company that already worked with the fbi, so no thx.