Tutanota's forceful request for recovery key is a authorities surveillance backdoor

Hiya,

Based on some intelligent information that I’ve received, the story behind the forceful request of Tutanota mail (tutanota-dot-com) for creating a recovery key, is just the authority of Ger~man intelli~gence ser~vice for accessing users email on Tutanota’s servers. so this means that they created a backdoor on the Tutanota mail servers. The request for the creating of ‘Recovery Key’ for Tutanota email never requested by users base(as far as I’m aware), but this will be the end of privacy for Tutanota mail users. Even from start, Tutanota will not allow users to Encrypt the emails by PGP, so this was emails will be encrypted twice(while even PGP is broken by three letter agencies before, also this, using it will better than don’t have any encryption at all, at least when you have a web-server, emails in your web-server encrypted by PGP key, is a little safer than you are not doing it at all.), this would be safer.

I don’t have any alternative options to suggest at the moment and I’m not sure that proton-mail be safer than Tutanota as well.

I don’t have a printable proof for this, as this kind of information will ever go public on newspapers ever.

I informed this to everyone be safe :blush:

If this is true then that’s a shame… I really like their service…

Wonder what other alternatives there are?

I’m curious to learn more about your source for this, @Blonde. Having a recovery key for services where the content is encrypted with the user’s password is quite common, so assuming that it’s a backdoor for German intelligence services seems a bit far-fetched to me given lack of other evidence.

EDIT: Tutanota has posted a clarification about the feature here.

I’ve written that

When I’m thinking, I feel stressful of what I’ve done and posted, just delete this post if you want.

Dear Fed agents: always when I’m posting, I’m behind the TOR networks and 5 connected layers of different VPN in different countries who boughten over anonymous internet by crypto and connected over public internet via live version of Tails where there is no CCTV. thank you?

@ualo protonmail.ch

hiya@ac2a

who knows that what strategy is implemented in that one, while this is an older product in the market. But I think they may have a darknet domain here protonirockerxow.onion but rumor said they don’t let registration over darknet(this flag up my security+privacy concerns) :sunglasses:

As per my knowledge, three letter agencies will attack all the encryption, protocols and middlewares. Unless you are qualified and know the process of how to make a encryption system that is three letter agencies proof, I guess anyone most probably fails.
Also I heard the police invented a new structure, that is turning off CCTV and rotating cameras 180-degree to opposite side. Simply they force you to speak and answer questions or going over bed with you,… This happened to someone I know in UK. When she complained to IOPC, the police denied everything and claimed ‘she is complaining to claim for compensation’ to deny her claim base. I forgot to mention, she was the victim and complained to police, so they give her justice lol

protonmail update: They ask for a telephone number for verification against Spam lol when registering, if you refuse/(sometimes-even-accept) to put recovery email(while opening the free 500MB email). It’s not possible to bypass telephone registration. So this is an invasion of privacy line again.

1 Like

Bro. You really need to do some studying. First of all, a recovery code is not a government backdoor. Tutanota does not have access to your recovery code. It does not allow them to decrypt your messages. It, essentially, is a second password. Second of all, you are not doing yourself any favors by connecting to Tor via a VPN.

Youre claims are ridiculous. It’s like saying because tutanota asks for a password that means they are able to back door you

What led you to think this in the first place? I am confused as to how you could come to the conclusion that a recovery code means that tutanota can backdoor your account? All their software is open source.

You have done nothing but put fear and doubt in to the mind of users and stirred the pot, as well as demonstrate your complete lack of understanding of the subject. Shame.

@tSScsIlxrk, please remember the rules in the FAQ:

You may wish to respond to something by disagreeing with it. That’s fine. But remember to criticize ideas, not people . Please avoid:

  • Name-calling
  • Ad hominem attacks
  • Responding to a post’s tone instead of its actual content
  • Knee-jerk contradiction

Instead, provide reasoned counter-arguments that improve the conversation.

No, that’s wrong. Firstly someone’s complete lack of cryptography knowledge exposed here in the last post that is mentioned “What do you mean back up your encryption. Key? The password you enter to decrypt your device IS your decryption key.” while this is wrong, as the answer is, an Encryption key is that can be used to restore the dmcrypt header, this(backup of the key) is for fail-safe in every standard encryption procedure.


Secondly, there are many reasons that backdoor claim is true, one proposal is by Mathematics theories say that if we can find one occasion that theory does not work, we prove that theory is false. This key can be created by using an algorithm over a series of data that user provides, thus while users even didn’t ask for this boldly, and its added, and this is a key that can be used by a supercomputer to search all emails in databases decrypted to find and flag up some accounts. While users that already flagged for a reason, that make the job easier for feds as they can decrypt that account using this key. This is a strategic cryptography matter for whom they know.

deepwebmap
Thirdly, someone’s ridiculous claim that using TOR without VPN is safe can have suspicious bases:

  1. Someone completely misleading for unknown and suspicious reasons, this can be one scenario;
    google-users-spy
  2. In five eyes to 14-eys countries also NATO areas, all people used the TOR without proper VPN setup or without proper encryption, where that service isn’t bought on proper anonym internet by proper crypto or user doesn’t have DNS encryption over TLS, she/he will be exposed to feds and will be flagged up on feds blacklist, that will affect you from when you are traveling abroad to when you are applying for clearance for job(even as a front job). This will be a permanent lifelong effect.


    1468859773120112
    Or

    !!

For whom that don’t have criminal records and researching/shopping under the radar, they know that keeping cover how much is important. It’s foolish that smart girl exposes herself unless she has a prison wish;

  1. Whenever someone in 14 eyes countries uses the TOR, this node will be tracked back to her/him, will expose his location and real IP and leads to unencrypted information. As feds themselves will running the some of the TOR nodes for you, under the name of,… They will track people down and lunch a honeypot for the victim,(fake website, fake cell tower, fake phone call from a legitimate number that you know or saved in phonebook) leading her/him to a fake website based on her/his searches interests, just clicking on products that it’s illegal to buy(even party drugs) or placing an order, will lead to jail sentence with no appeal possible, e.g. Ross Ulbricht case and how he gets arrested because of running an online shop is an example.
  2. Sadistic Feds are more males have more eager to catch cutie pie girls then ugly ones, sometimes secret agencies looking to trap the smart ones, when they get caught to undertake the torture from hell in prison:

    Or forcing her to accept to co-operate for life as an agent until she dies in mission impossible:
    last-moment
  • This is some innocent British teenagers who caught by NCA/GCHQ and forced to work under minimum wages or spend a long and traumatic jail time:

the-deep-and-dark-web-15-638

  • UK gave survillance power to Secret Servicies and Police to break into British peoples privacy lines, as same level of power of dictator countries have over their citizens: