tutamail.com. tuta.com. No phone required. No email required. No forced 2 factor authorization that is an excuse to grab your personal information to sell it. Never again on any of the tech email companies. Never again. I never agreed to give them my phone, they forced me to years after the fact when I needed to get in there suddenly.
Google, yahoo, aol, et al, will, for your own safety, because they are concerned about your security, make you hand over your phone number that they are allowed to use for commercial purposes in their TOS. You are welcome!
That’s a form of 2 factor auth, but that’s not what all 2 factor auth is. There are many services that use 2fA time based tokens, or other methods. Any service that uses your phone number for 2FA is actively making the security on your account worse.
tutamail.com. tuta.com. No phone required. No email required. No forced 2 factor authorization that is an excuse to grab your personal information to sell it. Never again on any of the tech email companies. Never again. I never agreed to give them my phone, they forced me to years after the fact when I needed to get in there suddenly.
What?
Google, yahoo, aol, et al, will, for your own safety, because they are concerned about your security, make you hand over your phone number that they are allowed to use for commercial purposes in their TOS. You are welcome!
That’s a form of 2 factor auth, but that’s not what all 2 factor auth is. There are many services that use 2fA time based tokens, or other methods. Any service that uses your phone number for 2FA is actively making the security on your account worse.