Blog

Stay informed with our latest publications.

isp selling data bill

ISP Selling Data Bill – Why Should You Care About it?

When we talk about online privacy, it’s usually to criticize tech giants like Google, Apple, Amazon, or Facebook for the way they collect their users’ data and then make money selling it without consent.  But they are not the only ones you should be concerned about. Your ISP could also be selling your data and, […]

October 28, 2020

Safest Email Service for Online Business

What is the Safest Email Service for Online Business?

Even though there are plenty of ways to communicate online, for most businesses email remains the number one communication tool even in 2020. However, the more emails you receive and open, the greater the chance of something with malware attached it is to slip by. Because of this, you need to find the safest email […]

October 26, 2020

Anonymous Payment Resources

The Only Anonymous Payment Resources You Will Ever Need?

If you’re like 69% of Americans, you probably bought something online at least once. There are a lot of convenient ways to pay online but have you ever stopped to consider the risks of revealing your identity and credit card info so freely? Luckily, these risks can be mitigated through anonymous payment. In this article, […]

October 22, 2020

What is a DNS Attack

What is a DNS Attack? What are the Most Dangerous DNS Attacks and How to Protect Against Them?

The Internet as we know it simply wouldn’t function without its vital part – DNS. Unfortunately, DNS has its vulnerabilities. An attack in which the hacker exploits DNS vulnerabilities is called a DNS attack and in this article we are going to explore some of the most common DNS attacks, why they happen and how […]

October 20, 2020

Norwegian Parliament

Norwegian Parliament Hit by Email Hack

Against email hackers, no one should really consider themselves 100% “safe”. This is a lesson several Norwegian Parliament employees and parliament members learned the hard way after the Stortinget suffered an email cyber attack in late August. That several Parliament email accounts at the stortinget.no address were hacked confirmed the Parliament’s President Tone Wilhemsen Trøen, […]

October 15, 2020

What is a Network Security Key

What is a Network Security Key?

At CTemplar, one of our main goals is helping users be more secure online, whether through our own encrypted email service or providing useful Internet safety and privacy tips. Not everyone is an Internet security and privacy expert though. Most people take the Internet for granted. They don’t have to bother knowing what an IP […]

October 14, 2020

How to Encrypt Your Internet Connection and Make it Safer

How to Encrypt Your Internet Connection and Make it Safer?

If you ask Internet users “do you want a more secure Internet connection?” you’ll have a hard time finding one that will answer negatively. Everyone wants a safer Internet. The problem is that most people don’t really know how to get it. At best, they create some strong passwords, avoid potentially malicious websites, look out […]

October 12, 2020

Net Neutrality

Net Neutrality and Privacy: The Pros and Cons of Net Neutrality

As the 2020 US Presidential Elections draw close, we thought it to be a good idea to refresh a little on net neutrality (especially since the two main candidates don’t seem to be paying any attention to it in their campaigns).  The net neutrality or Open Internet debate has been going on for over a […]

October 11, 2020

Self-Destructing Email

What is Self-Destructing Email and How It Can Help You?

Do you remember playing with invisible ink when you were a kid? Maybe you wrote a secret note that you wanted only one special person to read or you helped a buddy with an answer on a difficult exam. Well, we grew up now so we no longer use invisible ink to write notes.  Now […]

October 10, 2020

Snowshoe Spam Attack and How to Prevent it

What is a Snowshoe Spam Attack and How to Prevent it?

Although they are annoying as hell, one thing has to be said about spammers. They are inventive in finding new ways to avoid spam filters. One such “inventive” way to avoid spam blacklists is the snowshoe spam attack. What is the Snowshoe Spam Email? The first instances of snowshoe spam email date back to 2009, […]

October 5, 2020

Quick Tips for Internet Safety and Privacy

7 Quick Tips for Internet Safety and Privacy

The Internet itself is an awesome tool that can enrich your life, but only if you use it smartly. Every year brings a new cautionary tale of Internet privacy violation and this is why we have compiled these 7 quick tips that will protect your Internet safety and privacy if you stick to them. Educate […]

October 4, 2020

US Government Spy on its Citizens

Can the US Government Spy on its Citizens?

In most US citizens’ minds, there is little to no doubt that the government is spying on them. In two separate polls, 7 in 10 (Pew Research Center, 2017) and 8 in 10 (Monmouth University, 2018) people in the United States believe that the US government is tracking their emails, phone calls and other communication […]

October 1, 2020

End-to-End Encrypted Data

Why End-to-End Encrypted Data is Important to Protect Free Speech

This Wednesday, on his podcast #1536, Joe Rogan had the former NSA contractor and whistleblower, Edward Snowden as a guest. In about a two-and-a-half hour-long podcast the two touched on different topics like end-to-end encrypted data. If you haven’t already, I really recommend listening to this as it’s a very interesting conversation. Snowden was also […]

September 29, 2020

Am I Being Tracked by the Government

Am I Being Tracked by the Government?

2013 was a pivotal year for online privacy. It’s not that people weren’t thinking about Internet privacy problems by then, but it took Edward Snowden’s NSA leaks to really open most people’s eyes on how their government might by tracking them online. Of course, a lot has been said about Snowden and NSA, but there […]

September 28, 2020

Email Frequently Asked Questions
Tips to Prevent Email Hacking

5 Useful Tips to Prevent Email Hacking

Electronic mail is an incredibly useful communication method, but it does come with certain risks. In 2019, according to Verizon’s 2020 Data Breach Investigation Report, 94% of malware was delivered by email. Email hacking in one form or another is an all-present danger, so it’s more than useful to know how to increase safety to […]

September 27, 2020

Russian Hackers

Russian Hackers Attack Exim Mail Transfer Agent

As the November elections in the United States draw closer so do the fears of a repeated 2016 scenario when Russian hackers interfered in the presidential elections. It seems those worries have only gotten more fuel following the U.S. National Security Agency’s (NSA) advisory issued on 28th May. According to the NSA’s advisory, a group […]

September 26, 2020

Is Your Session Hijacked

Is Your Session Hijacked? How to Prevent Session Hijacking?

Every time you log in or access a website or server on the network you initiate what is called a “session”. Sessions represent a connection between the user’s computer or other device and a server and are what makes the exchange of information and data between two computers on the network possible. Most websites use […]

September 25, 2020

What is a Pharming Attack

What is a Pharming Attack and How to Prevent it?

Hackers and scammers have become very proficient at what they do to the level that very often their victims are not even aware that they are sent to a fake website. Such a website is called a pharming website. Pharming is an Internet scam similar to the better-known phishing, but with some notable differences (of […]

September 24, 2020

What is a CEO Fraud and How to Prevent it

What is a CEO Fraud and How to Prevent it?

Today companies and their employees need to be very aware of potential online scam dangers. Cybercriminals have become very sophisticated not just regarding the technologies and software they are using, but also in being better able to impersonate legitimate entities and getting sensitive information from their victims. One email scam where this is best shown […]

September 22, 2020

What Journalists Need to Know About Digital Safety and Security

What Journalists Need to Know About Digital Safety and Security?

The Internet and the digital era have disrupted many industries. Some, like real estate, marketing, commerce, etc. have found a way to thrive in the new digital world, while others like brick-and-mortar booksellers, language translators, travel agencies have seen a decline as a result of online services like Amazon or Expedia that essentially do the […]

September 20, 2020

CTemplar Mobile Code is Now Open Source!

CTemplar Mobile Code is Now Open Source!

Today, we are happy to announce that we have released our CTemplar mobile code as open source! With this, we continue our mission for open source email software and encryption that we are dedicated from day one here at CTemplar. What this means is that all of the CTemplar source code, including the one running […]

September 18, 2020

Secure Email Service for Journalism

How CTemplar Can Help Journalists in Their Work?

The journalist profession is full of danger. According to the UNESCO Observatory of Killed Journalists, 1402 journalists have been killed since 1993. In the last decade (2010-2020), there have been 923 journalists around the world who have lost their lives. We believe that a secure email service for journalism can do a lot to prevent […]

September 16, 2020

Email Cyber Attacks are on the Rise

Email Cyber Attacks are on the Rise. Protect Yourself, Don’t Wait to Get Hacked

Email cyber attacks are nothing new. They have been around in one form or another almost since email was first introduced.  The first recorded instance of a spam email can be traced back to 1978 (the first email was sent in 1970, so just 8 years prior) and it was  a message from Digital Equipment […]

September 15, 2020

Business Email Compromise

What is a Business Email Compromise and How to Protect Against it?

Email fraud can take different forms. Email security mistakes cost businesses billions of dollars per year. One particularly effective and dangerous type of email scam is the business email compromise attack, or BEC attack. What is a BEC attack? A BEC attack is a type of email scam in which the attacker targets an organization’s […]

September 13, 2020

SMTP Injection in G Suite

This SMTP Injection in G Suite Allows Google Email Domains to be Spoofed

A lot can be said about Gmail relying on outdated and often unsecure protocols. For instance, we’ve already covered here on our blog how hackers were able to bypass Google’s 2FA security back in 2018. That’s just one example.  One new example of this was discovered by Zohar Shachar in his blog post. Shachar is […]

September 9, 2020

3 Ways People Can Find Your IP

3 Ways People Can Find Your IP (But Not With CTemplar)

Your data is regularly bought and sold by online data companies, usually without either your knowledge or consent. One of the most common pieces of data these companies buy and sell is your IP, or internet protocol address. Your IP can reveal a lot of information about you and because of that, this article will […]

September 8, 2020

Make Sure Your Email is Safe with Zero-Knowledge Encryption

Make Sure Your Email is Safe with Zero-Knowledge Encryption

If you count on online services and providers to keep your sensitive private and financial information secure, you are taking a huge risk. Instead of going after the user himself for the password, hackers today go after the provider, well aware of the fact that many don’t adequately protect their user’s data, including usernames and […]

September 6, 2020

What is a Man-in-the-Middle Attack (MitM) and how to Prevent it

What is a Man-in-the-Middle Attack (MitM) and how to Prevent it

A “man-in-the-middle” attack takes place when a third party (cyber attacker) intercepts the transaction of data and information between two other parties and modifies it to steal sensitive information from them. In this article, we are going to look at what is man-in-the-middle attack and how it can be prevented using CTemplar encrypted email service. […]

September 3, 2020

Why Cannabis Buyers Should Use CTemplar Anonymous Email

Why Cannabis Buyers Should Use CTemplar Anonymous Email?

Are you interested in buying cannabis, but are worried what others might say if they find out? If that’s the case, let’s talk about secure email for cannabis professionals and why it is important to use encrypted and anonymous email service when doing this. In 2000, not to mention the 1990s or before, there weren’t […]

September 2, 2020

Why Every Lawyer Needs to Encrypt Their Email

Why Every Lawyer Needs to Encrypt Their Email?

Confidentiality has always been the most important element in the lawyer-client relationship. From the first time one person asked another to defend them in the court of law, the two have made a contract (first verbally and then in writing), that the lawyer will not reveal what their client tells them in confidence. That confidence […]

August 31, 2020

The Best Email Security for the Enterprise

The Best Email Security for the Enterprise

For many organizations, the email is still the number one communication tool for both internal (within the company) and external (with clients, customers and partners) communication.  It’s not easy to replace email (at least not completely) as we are so used to it (we had 40+ years) and we just don’t have the time (or […]

August 28, 2020

How to Securely Email When Working Remotely

How to Securely Email When Working Remotely?

With the COVID 19 global pandemic shutting most of the world inside most businesses have shut down their offices and have sent their staff to work from home. While this eliminates the risk of someone getting infected by the coronavirus and spreading it to his or her coworkers, it also presents a new digital security […]

August 27, 2020

How to Identify a Malicious or Phishing Email

How to Identify a Malicious or Phishing Email?

The COVID 19 pandemic has forced most organizations to leave their offices and shift more toward working remotely and from home. This is causing a bigger reliance on email to communicate within the organization and, as such, more risk for email phishing, scam and other fraud. In just one week in April, for example, Google […]

August 25, 2020

What is Spear Phishing

What is Spear Phishing?

Imagine two fishermen catching fish on a lake. One is throwing a net and is catching a variety of fish, most of them small. Maybe he catches something big enough, but maybe not.  The other fisherman, on the other hand, has a different approach. Instead of casting a net in the lake without much planning […]

August 24, 2020

What is TLS Encryption and How it Makes Your Email More Secure?

As interest in the more commercial and public use of the Internet started to grow in the 1980s and 1990s, it soon became apparent that it would be necessary to somehow secure communications between web applications and servers. As such, many companies released their communication protocol standards, but the problem with those is that they […]

August 21, 2020

What is SMIME and Do You Need it

What is S/MIME and Do You Need it?

Is your spam folder full? That’s good because it means that your email client’s filters are doing the job.  But what if I tell you that they are not able to identify ALL of the spam and phishing emails you get. Some of those still slip through.  You see, while spam and phishing have both […]

August 20, 2020

What is PGP Encryption

What is PGP Encryption? Everything You Need to Know About Pretty Good Privacy

Today, we are far from lacking in online communication options. The Internet provides us with multiple ways to connect with other people all around the world, including Skype, Slack, Google Hangouts, online forums, Twitter, Discord and so on. However, with over 4 billion users, email is still the number one means of communication, especially in […]

August 18, 2020

How to Get On the Dark Web and Safely Email Someone From it

How to Get On the Dark Web and Safely Email Someone From it?

Today, there are over 4.6 billion Internet users as of May 31st in the world, out of almost 7.8 billion people in total, according to the World Internet Users Statistics for 2020 Q1. In other words, almost 60% of people although mostly in developed countries) are using the Internet regularly. World Internet Statistics: WORLD INTERNET […]

August 17, 2020

How to Access an Email Service on the Dark Web

How to Access an Email Service on the Dark Web?

The web is a vast place where you can find information on almost anything from news around the world, latest sports results, funny memes, instructional videos on how to fix a car and many, many more useful and not-so-useful things.  However, the web that we know and use every day is only the surface part […]

August 13, 2020

Encrypt Your Gmail With OpenPGP

CTemplar: Encrypt Your Gmail With OpenPGP

When using Gmail it is important to understand how the email service protects your privacy and information. This is done through encryption. Encryption is a process that takes the readable text and alters it into a ciphertext. The ciphertext appears random and can only be read by someone with the right decryption key. We already […]

August 12, 2020

How Secure is Your Email Without the Encrypted Email Service

How Secure is Your Email Without the Encrypted Email Service?

For the past couple of years, you might have heard that email is obsolete and dead. Well, rumors of its death have been greatly exaggerated. Email is very much alive and kicking, especially in the business world where an average office worker receives 121 emails per day. The vast majority of emails are sent via […]

August 11, 2020

Everything About Anonymous Email

Everything About Anonymous Email You’ll Ever Need to Know

Imagine going through your day and someone behind you is recording your every step. Where you went to work, who you visited, when you went shopping, what you bought, etc. It wouldn’t be pleasant and if you say that person following you around, you would probably turn and tell them to stop it.  Would you […]

August 10, 2020

Tor Makes Your Email More Anonymous and Secure

How CTemplar Over Tor Makes Your Email More Anonymous and Secure

If you want to send an anonymous email to someone, it is not enough to simply use a fake name or not use your regular email address. There is plenty of other information that can give away your location or identity on the web.  This includes your IP address, DNS server, ISP connections, cookies and […]

August 7, 2020

Email Without Phone Verification

How to Make an Email Without Phone Verification?

Email is an essential tool in our private and business communication online, but if only it wasn’t as transparent as it is and more private, it would be so much better. Unfortunately, privacy is not something that big email providers like Gmail Microsoft Outlook or Yahoo want you to have (we can never have nice […]

August 3, 2020

Email Security Mistakes That Can Cost You Millions

Most Costly Email Security Mistakes That Can Cost You Millions

Cybersecurity threats constantly loom over us. Among them, none can be as dangerous and damaging as those related to email security. Whether you create a private email account or a business, these threats are ever-present. For example, according to Verizon’s 2019 Data Breach Investigation Report (DBIR), 94% of all malware was delivered via email.  Of […]

July 31, 2020

Email Security Tips for Keeping Your Account Anonymous

The Best 7 Free Email Security Tips for Keeping Your Account Anonymous

Besides being responsible for 397 thousand deaths (and still counting) and grinding the world economy to a near halt, the Covid-19 is responsible for another, more subverted danger.  It’s yet another excuse for governments to take away our online privacy by having us download coronavirus tracking apps that then have access to our location, photos, […]

July 30, 2020

Open-Source Email Service

The Best Open-Source Email Service

Why is CTemplar Using OpenPGP Encryption? In the technology community, that we at CTemplar are a proud member of, many new technologies are made through a collaboration between programmers, developers, engineers, and other experts. This ensures that knowledge gets shared and that the entire community (and not just one player) get to reap the benefits. […]

July 29, 2020

Email Security Trends You Need to Watch Out For

Top 7 2020 Email Security Trends You Need to Watch Out For

Email was invented nearly five decades ago (48 actually). But that does not mean it has remained stagnant. On the contrary, it has evolved countless times since 1972 until this day.  We have seen new email providers come into the picture, said goodbye to many along the way, and welcomed new features that made email […]

July 27, 2020

Bypass Google’s 2FA Security

How can Hackers Bypass Google’s 2FA Security

Two-factor authentication, or simply 2FA is often hailed as the best security one can get against scammers who want to get your login credentials. But is it all that cracked up to be or is there a way for a hacker to bypass google two-factor authentication?  If you thought that your usernames and passwords were […]

July 24, 2020

CTEMPLAR-TRANSPARENCY-REPORT

Transparency Report

Warranty Canary: No law enforcement agencies have been here. Watch for this statement’s removal or change. (What is a Warrant Canary?) Zero censorship policy. We do not censor harmful or revealing content about our company. We will publish all negative articles written about us HERE with the writer/researcher’s name, unedited, and any response. Password Protection: Our users’ passwords are hashed […]

May 23, 2020

CTemplar Apps

Best Anonymous Email Provider With Android Apps

How much do you access your email from mobile compared to desktop?  And also, how much are you concerned about your email privacy when using email on mobile devices? It probably won’t come as a big surprise if I tell you that people are using their mobile devices more than they do their desktop ones. […]

May 3, 2020

Master The Art Of Anonymous Email Addresses

Master The Art Of Anonymous Email Addresses

If you’re using email, you already know it’s a very convenient and easy way to communicate. Just write a message, click “Send” and the other side will get it almost immediately.  Even if they are on another continent. Few online communication channels can do that, at least not for free or as fast as email. […]

April 30, 2020

Get Anonymous Email

How to Get Anonymous Email? It’s Easy If You Do It Smart

Did you ever wonder how to get anonymous email but kept shying away from it because you thought it to be complicated? Or you had to know how to set up a proxy server? And what about encryption? Shouldn’t you know a thing or two about that? These are enough to make you think sending […]

April 22, 2020

The Insider’s Guide to Anonymous Email

The Insider’s Guide to Anonymous Email

Living in a digital world has its fair share of advantages. But you often trade our anonymity and privacy to be able to enjoy them. And you do that without a second thought. Sometimes, however, you don’t want the other side to know it was you who messaged them. Can You Send an Anonymous Email? […]

April 19, 2020

How to Send Documents Securely Over the Internet

How to Send Documents Securely Over Email

What do you do when you need to send sensitive information via email?  Simply putting an attachment to your email message is easy enough to do, but so will intercepting it be for someone other than the intended recipient. If the attachment contains sensitive or confidential information, that could lead to a serious problem. Fortunately, […]

April 14, 2020

How to Send a Secure Email

How to Send a Secure Email

If you’re like most people, you probably check your inbox at least 1-3 times per day, according to Statista.  That’s 1-3 opportunities to receive malware or other malicious threats straight to your inbox, as 94% of malware gets delivered via email according to Verizon’s 2019 Data Breach Investigations Report. And, with the average cost of […]

April 8, 2020

How to Delete Emails Instantly After Send

How to Delete Emails Instantly After Sending

Have you ever sent an email that you instantly regretted after hitting “send”? Maybe you sent an email to the wrong person or it was an angry mail to your boss, telling them (in not so kind words) what you think about them? Whatever the reason, you now want to unsend an email, but it’s […]

April 6, 2020

What does it Mean to Encrypt an Email

What does it mean to Encrypt an Email?

Try to imagine the Internet without the email. It doesn’t work, does it? The two just go hand in hand and are almost inseparable.  You probably have at least one email account if not more. The email was and still is crucial for communication over the Internet. However, in recent years we’ve seen more and […]

April 5, 2020

How to Create an Anonymous Email?

For all the freedom the Internet gives us, there’s a surprising number of things we just can’t or shouldn’t say in an email.  We have to keep quiet about how corrupt our boss is lest he finds out we’ve been badmouthing him and fires us. We can’t say anything about a secret deal our government […]

April 1, 2020

How to Anonymously Email Someone

How to Anonymously Email Someone?

Email is one of the cornerstones of online communication. Small wonder there as email is probably the easiest and cheapest long-distance communication medium. All you need is a computer, an email account (it’s free) and the email address of another person and you can start sending them emails. On top of that, email usually does […]

March 31, 2020

Our apps are available

Our CTemplar email apps for Android, F-Droid & iOS have all been released. We ask for your patience as we find and resolve any remaining bugs.  That being said, when you report a bug to us we consider it a gift.  You are showing us a way to improve our product.  When you make feature […]

March 6, 2020

Email Creation Restriction

Recently we have limited free account creation by invite only.  In the future, we might disable all new account creation for both free & paid.  We sincerely apologize for this inconvenience and we want to explain why this is happening. There are two reasons for this restriction Reasons for Account Creation Restriction: Reason #1: Our […]

March 3, 2020

Zero-censorship policy

We pledge to our community that we will not use censorship to hide negative press about our company.  Instead, we will publish negative or unedited articles about our company on this page with credit to the author/researcher.  If you do not see an article that you feel should be here please email us at media@ctemplar.com […]

January 23, 2020

CTemplar’s 4 Wall Protection

4 Wall Protection was defined by the CTemplar team with the goal of helping people review their privacy needs. Imagine that your privacy is a four-walled fortress. If a wall is missing, then an enemy can quickly get into your fortress. Therefore it’s vital that you make sure you receive adequate protection in the places […]

January 23, 2020

Privacy as Seen Through Fourteen Eyes

The history of citizen surveillance boils down to one simple theory: The more eyes you have watching citizens both friend and foe, the easier it is for governments to maintain peace and order. The first two countries in the world to recognize and implement this method of collaborative surveillance were the U.S. and U.K., who […]

January 23, 2020

CTemplar Whitepaper

How does encryption work in CTemplar? CTemplar uses OpenPGP for end-to-end encryption of emails. This is the most widely used email encryption standard and is defined by the OpenPGP Working Group of the Internet Engineering Task Force (IETF) as a Proposed Standard in RFC 4880. OpenPGP was originally derived from the PGP software, created by Phil Zimmermann. […]

January 23, 2020

Android App Open Beta Available

We are pleased to announce that we have launched our Android mobile app for beta testing. The app is available for all Android users by visiting the Google Play store. You can also find it by clicking this link. Open Source Android Code – We are doing an audit of our Android code during open beta testing.  […]

January 23, 2020

Our pricing explained

Why the Price? Providing an encrypted email service costs money. Some companies, like Gmail and Yahoo, offer free email because they profit from collecting and selling your personal information.   We charge a subscription fee because we do not sell our users data and because it costs money to maintain the code and servers.  We have the […]

January 23, 2020

CTemplar Recognizes Protonmail’s OpenPGPjs Maintenance

Edward Snowden stated: “Encryption, is the single best hope for fighting surveillance of any kind. If all our data, including our communications, were enciphered in this fashion, from end to end…then no government—no entity conceivable under our current knowledge of physics, for that matter—would be able to understand them.” OpenPGPjs is a method of encrypting email […]

June 19, 2019

Email Comparison Table

Comparison tables are often used to show the differences between services.  We respect these services, we have reviewed this table with both services and even recommend to them our users when we are not able to meet demand.  This is an analysis of the features we feel are important. ProtonMail strengths not mentioned above: ProtonMail […]

February 18, 2019

Icelandic Privacy Laws

Why Iceland? We host our users’ data on servers in Iceland because this offers the strongest legal protection for email users that want security and privacy.  Here are the reasons why: 1. Iceland Has No Data Retention Laws for Webmail. When you delete an email, it is instantly deleted and no backups are retained.  It’s […]

December 5, 2018

CTemplar Checksum Implementation

Encrypted Email Services Can Hack You Using JavaScript JavaScript can be used to serve malicious code, exploits, or hacks. This is illustrated by Gizmodo, USENIX, Ask Leo, Stack Exchange, ITNEXT, and it is a recurring theme at the hacker conference DEFCON. JavaScript hacks are also the primary way to de-anonymize Deep Web users. In November of 2018, Professor Kobeissi revealed that if JavaScript is required for […]

February 18, 2018