Stay informed with our latest publications.

Android Phone or Tablet More Private and Secure

15 Easy Ways to Make Your Android Phone or Tablet More Private and Secure

Recently, a very close acquaintance of mine had his mobile phone stolen and had to get a new one. Luckily, he was smart enough to immediately block it and he already had two-factor authentication set up on another device, so his data was well protected and there wasn’t much the thief could do. Now, this […]

March 6, 2021

Make Windows 10 More Private

How to Make Windows 10 More Private

One of the main reasons why Windows 10 is so popular is that Microsoft has made it incredibly convenient and easy to use. Unfortunately, like every big tech company, they too conveniently cut out on the user privacy department. The good news is that, with a little tinkering, you can make Windows 10 more private […]

February 27, 2021

Best Internet Privacy Tools

Best Internet Privacy Tools and a Privacy Guide You Need to Use to Secure Your Data in 2021

It seems everywhere you go online, someone wants to get your private information. Sometimes they are transparent about it and ask you straight up to fill an online form or similar, but often they just take your information without your knowledge or consent. That’s why we’ve created this online privacy guide to help keep your […]

February 26, 2021

Best Encryption Algorithm

What is the Best Encryption Algorithm?

According to IBM’s Cost of Data Breach Report 2020, the global average total cost of a data breach last year was $3.86 million, but you as an individual are safe, right? Wrong. Just because you’re not a business doesn’t mean that you should neglect to secure your data and data encryption is one of the […]

February 24, 2021

Encryption Methods and Their Algorithms

What are the Most Common Encryption Methods and Their Algorithms?

Today we live in a time when cybercrime is rampant and if you don’t protect our private information, you leave it exposed to criminals and other bad actors. Fortunately, you can use encryption to secure your data from them and get a little peace of mind when exchanging important information online.  With that in mind, […]

February 23, 2021

Onion VPN

What is Onion VPN and How it can Protect Your Online Privacy?

Are you looking for more privacy online? With so many prying eyes on the Internet, this is a tough task, but luckily, there are several tools that you can use to improve your privacy online. You probably heard of the two most important online privacy tools that you can use – Tor and VPN. But […]

February 22, 2021

Best Linux Distro for Privacy and Security

What is the Best Linux Distro for Privacy and Security

Are you a Linux user or are thinking of becoming one? If so, you are probably having (or will have) constant debates with fellow Windows and macOS users about whose OS is better. Well, while Linux can’t compare with Windows and macOS on usage share, with less than 2% of desktop computers in the world […]

February 17, 2021

What is DNS Leak

What is DNS Leak Protection?

Using a Virtual Private Network (VPN) is a good idea when you want to protect your online privacy and have a more secure Internet connection, but even the best VPN won’t matter if it doesn’t protect you from DNS leaks. In this article, we’ll explain: What is DNS leak How to check for DNS leaks […]

February 12, 2021

Google Know About You

How Much Does Google Know About You? More Than Anyone

Do you know who knows you best? Is it your significant other? Your parents? Best friend? Your doctor? If you think the answer is any of them, you’re wrong. The one who really knows you best is Google. The amount of information that Google knows and can learn about you is simply scary. But how […]

February 11, 2021

What is Online Privacy

What is Online Privacy Violation and How to Protect Yourself From One?

Be honest with yourself. How many times have you shared your data online without really considering the consequences? When signing up to a website, purchasing an item from an e-commerce store, or downloading an app, you expect the other side to hold their end of the bargain and keep your data safe. Except that doesn’t […]

February 10, 2021

What is Hashing

What is Hashing? What is the Purpose of Hashing?

Let’s say you need to copy a file from one computer to another. How would you ensure that the two files (original and copy) are the same? You can use hashing to do this. What is Hashing? But what is hashing and how it works exactly? A hashing algorithm transforms blocks of data that a […]

February 9, 2021

Encrypted Email

Why Use Encrypted Email? How will it Make Your Email Secure?

One of the most common questions people might ask you if you want to do business with them is “what is your email?”. Why do they ask this? Because email is still one of the best and most reliable ways to communicate online and that is why email is important. But if you’ve been using […]

February 6, 2021


How to Find Out Who Your Anonymous Email Sender is?

Sending an anonymous email can be useful in certain situations, such as when you want to protect your own identity online. We already talked at length about how to send an anonymous email and why, but what if you are on the receiving end of such an email and want to know who your mystery […]

February 4, 2021

Owner’s Easy Guide to Secure Email

The Business Owner’s Easy Guide to Secure Email (with Best Practices to Follow)

Having a secure email is important for any business, no matter its size or industry. Your business email is under constant threat from hackers and other bad actors, much more so than your personal email. For instance, according to Proofpoint’s 2020 State of the Phish report (pdf), as many as 88% of organizations have experienced […]

February 3, 2021

Email Privacy Laws in the Workplace

What are Email Privacy Laws in the Workplace?

Fewer and fewer people today send emails to their family or friends. Social media and messaging apps have largely replaced electronic mail as the main way to communicate online with someone close to us. When it comes to communicating at work, email is still number one, despite the resurgence of videoconferencing technology and apps like […]

January 23, 2021


Worst Cybersecurity Risks on the Darknet

However, to access the dark web, you will need special software called Tor. Tor is a free software  available for download at Tor Project that allows you to communicate anonymously online. We explained in one of our previous articles whether Tor is completely anonymous to use, so check that article as well. Before you do […]

January 21, 2021


Future Cybersecurity Predictions for the Year Ahead

Today, cyberattacks are the fastest-growing crime globally, surpassing illegal drug sales, human trafficking and other crimes. Cybersecurity Ventures even predicts that the global cost of cybercrime in 2021 will hit $6 trillion, which comparatively, is more than any world economy except for the United States and China. With that, here are our future cybersecurity predictions […]

January 17, 2021

is tor browser safe

Is Tor Browser Safe and Completely Anonymous to Use?

Tor Risks and Security Issues Unfortunately, like anything else in life (online or offline), Tor is not perfect either and it has its flaws. We’ll go over the biggest ones here: It can leak your IP address One of the biggest reasons why it’s not a good idea to rely solely on Tor if you […]

January 13, 2021

Email Security Roundup

Email Security Roundup 2020 (Biggest Email Scams, Phishing Attacks, BECs and Data Breaches of the Year)

2020 is almost at an end (thankfully). And while we certainly can’t say it was a particularly good year, considering the global pandemic, for some it was even worse as they’ve been victims to email scams, BEC, phishing attacks and data breaches. So let’s take a look back at some of the biggest business email […]

January 3, 2021

Mistakes That Can Ruin Your Email Security

27 Biggest Mistakes That Can Ruin Your Email Security

What is email security? Email security is a set of procedures and techniques used in email communication to protect email accounts and data the email contains against loss, compromise, or unauthorized access. Email is a great and easy-to-use communication channel, both for individuals and companies. Unfortunately, when people use email, they often do so without […]

December 30, 2020

send encrypted email from android

How to Send Encrypted Email From Android?

If you are like most people (85% according to a Mobile Email Statistics report by 99 Firms), you are probably using your smartphone to check your email. However, with cyber threats around every Internet corner and potential data breaches (recently even several US federal agencies got breached, possibly due to a phishing email), it has […]

December 18, 2020

how to prevent email spoofing attacks

How to Prevent Email Spoofing Attacks?

Have you received an email that appears to have been sent by someone you know but you had a feeling there was something just off with it? That email could have been sent by someone else entirely and you might have been a victim of an email spoofing attack. If that happened and you’ve already […]

December 16, 2020

different types of malware

How to Save Yourself from Different Types of Malware?

What are different types of malware: Here are the 10 most common types of malware your device can get infected with: Trojan Worm Virus Grayware Ransomware Malvertising Keylogger Rootkit Bot Mobile malware. What is a RAT malware email? A RAT malware email, or Remote Access Trojan is a type of trojan that allows the cybercriminal […]

December 14, 2020

German Court Strong-arms Privacy

German Court Strong-arms Privacy Email Provider Tutanota to Help Monitor Mailboxes

In a ruling from November, the Cologne Regional Court had pressured the privacy email provider Tutanota to integrate a function that would allow investigators to read emails in plain text and monitor mailboxes. As such, Tutanota must now develop what is essentially a backdoor that would enable the police to monitor a mailbox by the […]

December 13, 2020

Email Security Best Practice

21 Email Security Best Practice You Need to Follow in 2021

For most organizations, email is still the number one communication channel, even though a lot of them have in recent times moved to chat and VoIP. This only means that, in 2021, email security is still something to pay close attention to. In this article, we’ll show you some tips and email security tips and […]

December 9, 2020

false name used by an author

Why a Pseudonym Won’t be Enough to Keep You Anonymous Online?

What is the first thing you think of when you want to be anonymous online? It’s probably using some kind of a fake name or a pseudonym. After all, this was a tried and tested method used for centuries by writers who, for one reason or another, didn’t want their real name known when publishing […]

December 4, 2020

Email-Based Phishing Attack

How to Protect From an Email-Based Phishing Attack?

You probably received at least once an email like this: “Your account will soon be disabled for security reasons, please confirm your identity to continue using it.”, followed by a link you’re supposed to go to that would lead you to the website where you could “confirm your identity” and continue using the account. I […]

December 3, 2020

Email Attack Types

4 Email Attack Types You Should Get Ready for in 2021

We can all agree that 2020 wasn’t the best year and that we all want to forget it as quickly as possible. But surely, 2021 can only be better, right? Well, it could be or it might not be. A lot of things in 2020 hit us completely unawares, like the Covid-19. But while we […]

December 1, 2020

Best Privacy Browser

Choosing the Best Privacy Browser for 2021

A web browser is like your personal chauffeur on the Internet. It will take you to any website you want (as long as it exists and is working) in mere seconds. Without it, getting around the Internet would be very difficult, if not impossible. But a web browser also keeps tabs on you. It remembers […]

November 29, 2020

secure email

The Best Free Way to Send a Secure Email

The need to send secure email has seemingly never been greater than today. As 2020 is drawing to a close it has, on more than a few occasions, showed us why we need encrypted email now more than ever. The Covid-19 pandemic, racial and police brutality protests in the United States and most recently the […]

November 28, 2020

email exposed on dark web

What to Do if Your Information is Found on the Dark Web?

The biggest problem when someone steals your data on the Internet isn’t that they might take all the money from your credit card and then leave it. If that were the case, it wouldn’t be that much of a big deal. The real problem is what they do with your data after. Namely, hackers can […]

November 24, 2020

What is Backdoor Encryption

Why Backdoor Encryption is a Terrible Idea?

Does the term “backdoor encryption” bring a feeling of extra security or fear into your mind? Perhaps you are 100% pro-government (doesn’t have to be “this” government) and think they have every right to snoop into your private data, but if you are like most and are concerned about your privacy, you’ll probably flinch at […]

November 22, 2020

best free encrypted email service

How to Send Encrypted Email for Free?

In theory, an email message is a private correspondence between a sender and a recipient. In practice, it passes beneath a lot of eyes between those two and a lot of those eyes are more than curious about what’s in the email. Because of this, you need to use the best free encrypted email service […]

November 20, 2020

Most Secure Web Browser

What is the Most Secure Web Browser You Should Look at in 2021?

Your web browser can tell a lot about you, including: What websites you like to visit. Your usernames and passwords. Names, addresses, phone numbers, email addresses and other autofill information. Cookies and trackers that websites place on your browser. All of this information can be collected – and even exploited – by third parties like […]

November 16, 2020

Free Secure Email Account

Why Your Organization Needs a Free Secure Email Account?

Does your company have a free secure email account, or are you risking your organization’s and your customer’s valuable information? Although we have seen in the recent few years organizations communicate both internally and externally in many different ways, including video calls, chat rooms, audio conferencing and so on, email remains the most popular method. […]

November 15, 2020

Best Anti-Phishing Solutions

What are the Best Anti-Phishing Solutions You can Use to Protect Your Email?

Phishing is a very common and often expensive problem that every email owner encounters at least once. However, it gets even worse for business email accounts. According to Cybint’s 15 Alarming Cyber Security Facts and Stats report, as many as 62% of companies have experienced a phishing attack at least once. Phishing, unfortunately, isn’t just […]

November 7, 2020

email security solutions

How to Choose the Best Email Security Solutions for Your Business

While there are plenty of different ways to communicate online, including chat, VoIP, text, social media and so on, for businesses, even 50 years after it first came to the scene, email remains the number one online communication tool. Today, however, in 2020, we are faced with much more online threats than were around in […]

November 1, 2020

isp selling data bill

ISP Selling Data Bill – Why Should You Care About it?

When we talk about online privacy, it’s usually to criticize tech giants like Google, Apple, Amazon, or Facebook for the way they collect their users’ data and then make money selling it without consent.  But they are not the only ones you should be concerned about. Your ISP could also be selling your data and, […]

October 28, 2020

Safest Email Service for Online Business

What is the Safest Email Service for Online Business?

Even though there are plenty of ways to communicate online, for most businesses email remains the number one communication tool even in 2020. However, the more emails you receive and open, the greater the chance of something with malware attached it is to slip by. Because of this, you need to find the safest email […]

October 26, 2020

Anonymous Payment Resources

The Only Anonymous Payment Resources You Will Ever Need?

If you’re like 69% of Americans, you probably bought something online at least once. There are a lot of convenient ways to pay online but have you ever stopped to consider the risks of revealing your identity and credit card info so freely? Luckily, these risks can be mitigated through anonymous payment. In this article, […]

October 22, 2020

What is a DNS Attack

What is a DNS Attack? What are the Most Dangerous DNS Attacks and How to Protect Against Them?

The Internet as we know it simply wouldn’t function without its vital part – DNS. Unfortunately, DNS has its vulnerabilities. An attack in which the hacker exploits DNS vulnerabilities is called a DNS attack and in this article we are going to explore some of the most common DNS attacks, why they happen and how […]

October 20, 2020

Norwegian Parliament

Norwegian Parliament Hit by Email Hack

Against email hackers, no one should really consider themselves 100% “safe”. This is a lesson several Norwegian Parliament employees and parliament members learned the hard way after the Stortinget suffered an email cyber attack in late August. That several Parliament email accounts at the address were hacked confirmed the Parliament’s President Tone Wilhemsen Trøen, […]

October 15, 2020

What is a Network Security Key

What is a Network Security Key?

At CTemplar, one of our main goals is helping users be more secure online, whether through our own encrypted email service or providing useful Internet safety and privacy tips. Not everyone is an Internet security and privacy expert though. Most people take the Internet for granted. They don’t have to bother knowing what an IP […]

October 14, 2020

How to Encrypt Your Internet Connection and Make it Safer

How to Encrypt Your Internet Connection and Make it Safer?

If you ask Internet users “do you want a more secure Internet connection?” you’ll have a hard time finding one that will answer negatively. Everyone wants a safer Internet. The problem is that most people don’t really know how to get it. At best, they create some strong passwords, avoid potentially malicious websites, look out […]

October 12, 2020

Net Neutrality

Net Neutrality and Privacy: The Pros and Cons of Net Neutrality

As the 2020 US Presidential Elections draw close, we thought it to be a good idea to refresh a little on net neutrality (especially since the two main candidates don’t seem to be paying any attention to it in their campaigns).  The net neutrality or Open Internet debate has been going on for over a […]

October 11, 2020

Self-Destructing Email

What is Self-Destructing Email and How It Can Help You?

Do you remember playing with invisible ink when you were a kid? Maybe you wrote a secret note that you wanted only one special person to read or you helped a buddy with an answer on a difficult exam. Well, we grew up now so we no longer use invisible ink to write notes.  Now […]

October 10, 2020

Snowshoe Spam Attack and How to Prevent it

What is a Snowshoe Spam Attack and How to Prevent it?

Although they are annoying as hell, one thing has to be said about spammers. They are inventive in finding new ways to avoid spam filters. One such “inventive” way to avoid spam blacklists is the snowshoe spam attack. What is the Snowshoe Spam Email? The first instances of snowshoe spam email date back to 2009, […]

October 5, 2020

Quick Tips for Internet Safety and Privacy

7 Quick Tips for Internet Safety and Privacy

The Internet itself is an awesome tool that can enrich your life, but only if you use it smartly. Every year brings a new cautionary tale of Internet privacy violation and this is why we have compiled these 7 quick tips that will protect your Internet safety and privacy if you stick to them. Educate […]

October 4, 2020

US Government Spy on its Citizens

Can the US Government Spy on its Citizens?

In most US citizens’ minds, there is little to no doubt that the government is spying on them. In two separate polls, 7 in 10 (Pew Research Center, 2017) and 8 in 10 (Monmouth University, 2018) people in the United States believe that the US government is tracking their emails, phone calls and other communication […]

October 1, 2020

End-to-End Encrypted Data

Why End-to-End Encrypted Data is Important to Protect Free Speech

This Wednesday, on his podcast #1536, Joe Rogan had the former NSA contractor and whistleblower, Edward Snowden as a guest. In about a two-and-a-half hour-long podcast the two touched on different topics like end-to-end encrypted data. If you haven’t already, I really recommend listening to this as it’s a very interesting conversation. Snowden was also […]

September 29, 2020

Am I Being Tracked by the Government

Am I Being Tracked by the Government?

2013 was a pivotal year for online privacy. It’s not that people weren’t thinking about Internet privacy problems by then, but it took Edward Snowden’s NSA leaks to really open most people’s eyes on how their government might by tracking them online. Of course, a lot has been said about Snowden and NSA, but there […]

September 28, 2020

Email Frequently Asked Questions
Tips to Prevent Email Hacking

5 Useful Tips to Prevent Email Hacking

Electronic mail is an incredibly useful communication method, but it does come with certain risks. In 2019, according to Verizon’s 2020 Data Breach Investigation Report, 94% of malware was delivered by email. Email hacking in one form or another is an all-present danger, so it’s more than useful to know how to increase safety to […]

September 27, 2020

Russian Hackers

Russian Hackers Attack Exim Mail Transfer Agent

As the November elections in the United States draw closer so do the fears of a repeated 2016 scenario when Russian hackers interfered in the presidential elections. It seems those worries have only gotten more fuel following the U.S. National Security Agency’s (NSA) advisory issued on 28th May. According to the NSA’s advisory, a group […]

September 26, 2020

Is Your Session Hijacked

Is Your Session Hijacked? How to Prevent Session Hijacking?

Every time you log in or access a website or server on the network you initiate what is called a “session”. Sessions represent a connection between the user’s computer or other device and a server and are what makes the exchange of information and data between two computers on the network possible. Most websites use […]

September 25, 2020

What is a Pharming Attack

What is a Pharming Attack and How to Prevent it?

Hackers and scammers have become very proficient at what they do to the level that very often their victims are not even aware that they are sent to a fake website. Such a website is called a pharming website. Pharming is an Internet scam similar to the better-known phishing, but with some notable differences (of […]

September 24, 2020

What is a CEO Fraud and How to Prevent it

What is a CEO Fraud and How to Prevent it?

Today companies and their employees need to be very aware of potential online scam dangers. Cybercriminals have become very sophisticated not just regarding the technologies and software they are using, but also in being better able to impersonate legitimate entities and getting sensitive information from their victims. One email scam where this is best shown […]

September 22, 2020

What Journalists Need to Know About Digital Safety and Security

What Journalists Need to Know About Digital Safety and Security?

The Internet and the digital era have disrupted many industries. Some, like real estate, marketing, commerce, etc. have found a way to thrive in the new digital world, while others like brick-and-mortar booksellers, language translators, travel agencies have seen a decline as a result of online services like Amazon or Expedia that essentially do the […]

September 20, 2020

CTemplar Mobile Code is Now Open Source!

CTemplar Mobile Code is Now Open Source!

Today, we are happy to announce that we have released our CTemplar mobile code as open source! With this, we continue our mission for open source email software and encryption that we are dedicated from day one here at CTemplar. What this means is that all of the CTemplar source code, including the one running […]

September 18, 2020

Secure Email Service for Journalism

How CTemplar Can Help Journalists in Their Work?

The journalist profession is full of danger. According to the UNESCO Observatory of Killed Journalists, 1402 journalists have been killed since 1993. In the last decade (2010-2020), there have been 923 journalists around the world who have lost their lives. We believe that a secure email service for journalism can do a lot to prevent […]

September 16, 2020

Email Cyber Attacks are on the Rise

Email Cyber Attacks are on the Rise. Protect Yourself, Don’t Wait to Get Hacked

Email cyber attacks are nothing new. They have been around in one form or another almost since email was first introduced.  The first recorded instance of a spam email can be traced back to 1978 (the first email was sent in 1970, so just 8 years prior) and it was  a message from Digital Equipment […]

September 15, 2020

Business Email Compromise

What is a Business Email Compromise and How to Protect Against it?

Email fraud can take different forms. Email security mistakes cost businesses billions of dollars per year. One particularly effective and dangerous type of email scam is the business email compromise attack, or BEC attack. What is a BEC attack? A BEC attack is a type of email scam in which the attacker targets an organization’s […]

September 13, 2020

SMTP Injection in G Suite

This SMTP Injection in G Suite Allows Google Email Domains to be Spoofed

A lot can be said about Gmail relying on outdated and often unsecure protocols. For instance, we’ve already covered here on our blog how hackers were able to bypass Google’s 2FA security back in 2018. That’s just one example.  One new example of this was discovered by Zohar Shachar in his blog post. Shachar is […]

September 9, 2020

3 Ways People Can Find Your IP

3 Ways People Can Find Your IP (But Not With CTemplar)

Your data is regularly bought and sold by online data companies, usually without either your knowledge or consent. One of the most common pieces of data these companies buy and sell is your IP, or internet protocol address. Your IP can reveal a lot of information about you and because of that, this article will […]

September 8, 2020

Make Sure Your Email is Safe with Zero-Knowledge Encryption

Make Sure Your Email is Safe with Zero-Knowledge Encryption

If you count on online services and providers to keep your sensitive private and financial information secure, you are taking a huge risk. Instead of going after the user himself for the password, hackers today go after the provider, well aware of the fact that many don’t adequately protect their user’s data, including usernames and […]

September 6, 2020

What is a Man-in-the-Middle Attack (MitM) and how to Prevent it

What is a Man-in-the-Middle Attack (MitM) and how to Prevent it

A “man-in-the-middle” attack takes place when a third party (cyber attacker) intercepts the transaction of data and information between two other parties and modifies it to steal sensitive information from them. In this article, we are going to look at what is man-in-the-middle attack and how it can be prevented using CTemplar encrypted email service. […]

September 3, 2020

Why Cannabis Buyers Should Use CTemplar Anonymous Email

Why Cannabis Buyers Should Use CTemplar Anonymous Email?

Are you interested in buying cannabis, but are worried what others might say if they find out? If that’s the case, let’s talk about secure email for cannabis professionals and why it is important to use encrypted and anonymous email service when doing this. In 2000, not to mention the 1990s or before, there weren’t […]

September 2, 2020

Why Every Lawyer Needs to Encrypt Their Email

Why Every Lawyer Needs to Encrypt Their Email?

Confidentiality has always been the most important element in the lawyer-client relationship. From the first time one person asked another to defend them in the court of law, the two have made a contract (first verbally and then in writing), that the lawyer will not reveal what their client tells them in confidence. That confidence […]

August 31, 2020

The Best Email Security for the Enterprise

The Best Email Security for the Enterprise

For many organizations, the email is still the number one communication tool for both internal (within the company) and external (with clients, customers and partners) communication.  It’s not easy to replace email (at least not completely) as we are so used to it (we had 40+ years) and we just don’t have the time (or […]

August 28, 2020

How to Securely Email When Working Remotely

How to Securely Email When Working Remotely?

With the COVID 19 global pandemic shutting most of the world inside most businesses have shut down their offices and have sent their staff to work from home. While this eliminates the risk of someone getting infected by the coronavirus and spreading it to his or her coworkers, it also presents a new digital security […]

August 27, 2020

How to Identify a Malicious or Phishing Email

How to Identify a Malicious or Phishing Email?

The COVID 19 pandemic has forced most organizations to leave their offices and shift more toward working remotely and from home. This is causing a bigger reliance on email to communicate within the organization and, as such, more risk for email phishing, scam and other fraud. In just one week in April, for example, Google […]

August 25, 2020

What is Spear Phishing

What is Spear Phishing?

Imagine two fishermen catching fish on a lake. One is throwing a net and is catching a variety of fish, most of them small. Maybe he catches something big enough, but maybe not.  The other fisherman, on the other hand, has a different approach. Instead of casting a net in the lake without much planning […]

August 24, 2020

What is TLS Encryption and How it Makes Your Email More Secure?

As interest in the more commercial and public use of the Internet started to grow in the 1980s and 1990s, it soon became apparent that it would be necessary to somehow secure communications between web applications and servers. As such, many companies released their communication protocol standards, but the problem with those is that they […]

August 21, 2020

What is SMIME and Do You Need it

What is S/MIME and Do You Need it?

Is your spam folder full? That’s good because it means that your email client’s filters are doing the job.  But what if I tell you that they are not able to identify ALL of the spam and phishing emails you get. Some of those still slip through.  You see, while spam and phishing have both […]

August 20, 2020

What is PGP Encryption

What is PGP Encryption? Everything You Need to Know About Pretty Good Privacy

Today, we are far from lacking in online communication options. The Internet provides us with multiple ways to connect with other people all around the world, including Skype, Slack, Google Hangouts, online forums, Twitter, Discord and so on. However, with over 4 billion users, email is still the number one means of communication, especially in […]

August 18, 2020

How to Get On the Dark Web and Safely Email Someone From it

How to Get On the Dark Web and Safely Email Someone From it?

Today, there are over 4.6 billion Internet users as of May 31st in the world, out of almost 7.8 billion people in total, according to the World Internet Users Statistics for 2020 Q1. In other words, almost 60% of people although mostly in developed countries) are using the Internet regularly. World Internet Statistics: WORLD INTERNET […]

August 17, 2020

How to Access an Email Service on the Dark Web

How to Access an Email Service on the Dark Web?

The web is a vast place where you can find information on almost anything from news around the world, latest sports results, funny memes, instructional videos on how to fix a car and many, many more useful and not-so-useful things.  However, the web that we know and use every day is only the surface part […]

August 13, 2020

Encrypt Your Gmail With OpenPGP

CTemplar: Encrypt Your Gmail With OpenPGP

When using Gmail it is important to understand how the email service protects your privacy and information. This is done through encryption. Encryption is a process that takes the readable text and alters it into a ciphertext. The ciphertext appears random and can only be read by someone with the right decryption key. We already […]

August 12, 2020

How Secure is Your Email Without the Encrypted Email Service

How Secure is Your Email Without the Encrypted Email Service?

For the past couple of years, you might have heard that email is obsolete and dead. Well, rumors of its death have been greatly exaggerated. Email is very much alive and kicking, especially in the business world where an average office worker receives 121 emails per day. The vast majority of emails are sent via […]

August 11, 2020

Everything About Anonymous Email

Everything About Anonymous Email You’ll Ever Need to Know

Imagine going through your day and someone behind you is recording your every step. Where you went to work, who you visited, when you went shopping, what you bought, etc. It wouldn’t be pleasant and if you say that person following you around, you would probably turn and tell them to stop it.  Would you […]

August 10, 2020

Tor Makes Your Email More Anonymous and Secure

How CTemplar Over Tor Makes Your Email More Anonymous and Secure

If you want to send an anonymous email to someone, it is not enough to simply use a fake name or not use your regular email address. There is plenty of other information that can give away your location or identity on the web.  This includes your IP address, DNS server, ISP connections, cookies and […]

August 7, 2020

Email Without Phone Verification

How to Make an Email Without Phone Verification?

Email is an essential tool in our private and business communication online, but if only it wasn’t as transparent as it is and more private, it would be so much better. Unfortunately, privacy is not something that big email providers like Gmail Microsoft Outlook or Yahoo want you to have (we can never have nice […]

August 3, 2020

Email Security Mistakes That Can Cost You Millions

Most Costly Email Security Mistakes That Can Cost You Millions

Cybersecurity threats constantly loom over us. Among them, none can be as dangerous and damaging as those related to email security. Whether you create a private email account or a business, these threats are ever-present. For example, according to Verizon’s 2019 Data Breach Investigation Report (DBIR), 94% of all malware was delivered via email.  Of […]

July 31, 2020

Email Security Tips for Keeping Your Account Anonymous

The Best 7 Free Email Security Tips for Keeping Your Account Anonymous

Besides being responsible for 397 thousand deaths (and still counting) and grinding the world economy to a near halt, the Covid-19 is responsible for another, more subverted danger.  It’s yet another excuse for governments to take away our online privacy by having us download coronavirus tracking apps that then have access to our location, photos, […]

July 30, 2020

Open-Source Email Service

The Best Open-Source Email Service

Why is CTemplar Using OpenPGP Encryption? In the technology community, that we at CTemplar are a proud member of, many new technologies are made through a collaboration between programmers, developers, engineers, and other experts. This ensures that knowledge gets shared and that the entire community (and not just one player) get to reap the benefits. […]

July 29, 2020

Email Security Trends You Need to Watch Out For

Top 7 2020 Email Security Trends You Need to Watch Out For

Email was invented nearly five decades ago (48 actually). But that does not mean it has remained stagnant. On the contrary, it has evolved countless times since 1972 until this day.  We have seen new email providers come into the picture, said goodbye to many along the way, and welcomed new features that made email […]

July 27, 2020

Bypass Google’s 2FA Security

How can Hackers Bypass Google’s 2FA Security

Two-factor authentication, or simply 2FA is often hailed as the best security one can get against scammers who want to get your login credentials. But is it all that cracked up to be or is there a way for a hacker to bypass google two-factor authentication?  If you thought that your usernames and passwords were […]

July 24, 2020


Transparency Report

Warranty Canary: No law enforcement agencies have been here. Watch for this statement’s removal or change. (What is a Warrant Canary?) Zero censorship policy. We do not censor harmful or revealing content about our company. We will publish all negative articles written about us HERE with the writer/researcher’s name, unedited, and any response. Password Protection: Our users’ passwords are hashed […]

May 23, 2020

CTemplar Apps

Best Anonymous Email Provider With Android Apps

How much do you access your email from mobile compared to desktop?  And also, how much are you concerned about your email privacy when using email on mobile devices? It probably won’t come as a big surprise if I tell you that people are using their mobile devices more than they do their desktop ones. […]

May 3, 2020

Master The Art Of Anonymous Email Addresses

Master The Art Of Anonymous Email Addresses

If you’re using email, you already know it’s a very convenient and easy way to communicate. Just write a message, click “Send” and the other side will get it almost immediately.  Even if they are on another continent. Few online communication channels can do that, at least not for free or as fast as email. […]

April 30, 2020

Get Anonymous Email

How to Get Anonymous Email? It’s Easy If You Do It Smart

Did you ever wonder how to get anonymous email but kept shying away from it because you thought it to be complicated? Or you had to know how to set up a proxy server? And what about encryption? Shouldn’t you know a thing or two about that? These are enough to make you think sending […]

April 22, 2020

The Insider’s Guide to Anonymous Email

The Insider’s Guide to Anonymous Email

Living in a digital world has its fair share of advantages. But you often trade our anonymity and privacy to be able to enjoy them. And you do that without a second thought. Sometimes, however, you don’t want the other side to know it was you who messaged them. Can You Send an Anonymous Email? […]

April 19, 2020

How to Send Documents Securely Over the Internet

How to Send Documents Securely Over Email

What do you do when you need to send sensitive information via email?  Simply putting an attachment to your email message is easy enough to do, but so will intercepting it be for someone other than the intended recipient. If the attachment contains sensitive or confidential information, that could lead to a serious problem. Fortunately, […]

April 14, 2020

How to Send a Secure Email

How to Send a Secure Email

If you’re like most people, you probably check your inbox at least 1-3 times per day, according to Statista.  That’s 1-3 opportunities to receive malware or other malicious threats straight to your inbox, as 94% of malware gets delivered via email according to Verizon’s 2019 Data Breach Investigations Report. And, with the average cost of […]

April 8, 2020

How to Delete Emails Instantly After Send

How to Delete Emails Instantly After Sending

Have you ever sent an email that you instantly regretted after hitting “send”? Maybe you sent an email to the wrong person or it was an angry mail to your boss, telling them (in not so kind words) what you think about them? Whatever the reason, you now want to unsend an email, but it’s […]

April 6, 2020

What does it Mean to Encrypt an Email

What does it mean to Encrypt an Email?

Try to imagine the Internet without the email. It doesn’t work, does it? The two just go hand in hand and are almost inseparable.  You probably have at least one email account if not more. The email was and still is crucial for communication over the Internet. However, in recent years we’ve seen more and […]

April 5, 2020

How to Create an Anonymous Email?

For all the freedom the Internet gives us, there’s a surprising number of things we just can’t or shouldn’t say in an email.  We have to keep quiet about how corrupt our boss is lest he finds out we’ve been badmouthing him and fires us. We can’t say anything about a secret deal our government […]

April 1, 2020

How to Anonymously Email Someone

How to Anonymously Email Someone?

What is anonymous email? There are situations when you want to avoid having your identity, including your own email address and other personally identifiable information (PII) to be known by the recipient. In those situations, you would need to use an anonymous email account. There are several ways to create an anonymous email account, as […]

March 31, 2020

Our apps are available

Our CTemplar email apps for Android, F-Droid & iOS have all been released. We ask for your patience as we find and resolve any remaining bugs.  That being said, when you report a bug to us we consider it a gift.  You are showing us a way to improve our product.  When you make feature […]

March 6, 2020

Email Creation Restriction

Recently we have limited free account creation by invite only.  In the future, we might disable all new account creation for both free & paid.  We sincerely apologize for this inconvenience and we want to explain why this is happening. There are two reasons for this restriction Reasons for Account Creation Restriction: Reason #1: Our […]

March 3, 2020

Zero-censorship policy

We pledge to our community that we will not use censorship to hide negative press about our company.  Instead, we will publish negative or unedited articles about our company on this page with credit to the author/researcher.  If you do not see an article that you feel should be here please email us at […]

January 23, 2020

CTemplar’s 4 Wall Protection

4 Wall Protection was defined by the CTemplar team with the goal of helping people review their privacy needs. Imagine that your privacy is a four-walled fortress. If a wall is missing, then an enemy can quickly get into your fortress. Therefore it’s vital that you make sure you receive adequate protection in the places […]

January 23, 2020

Privacy as Seen Through Fourteen Eyes

The history of citizen surveillance boils down to one simple theory: The more eyes you have watching citizens both friend and foe, the easier it is for governments to maintain peace and order. The first two countries in the world to recognize and implement this method of collaborative surveillance were the U.S. and U.K., who […]

January 23, 2020

CTemplar Whitepaper

How does encryption work in CTemplar? CTemplar uses OpenPGP for end-to-end encryption of emails. This is the most widely used email encryption standard and is defined by the OpenPGP Working Group of the Internet Engineering Task Force (IETF) as a Proposed Standard in RFC 4880. OpenPGP was originally derived from the PGP software, created by Phil Zimmermann. […]

January 23, 2020

Android App Open Beta Available

We are pleased to announce that we have launched our Android mobile app for beta testing. The app is available for all Android users by visiting the Google Play store. You can also find it by clicking this link. Open Source Android Code – We are doing an audit of our Android code during open beta testing.  […]

January 23, 2020

Our pricing explained

Why the Price? Providing an encrypted email service costs money. Some companies, like Gmail and Yahoo, offer free email because they profit from collecting and selling your personal information.   We charge a subscription fee because we do not sell our users data and because it costs money to maintain the code and servers.  We have the […]

January 23, 2020

CTemplar Recognizes Protonmail’s OpenPGPjs Maintenance

Edward Snowden stated: “Encryption, is the single best hope for fighting surveillance of any kind. If all our data, including our communications, were enciphered in this fashion, from end to end…then no government—no entity conceivable under our current knowledge of physics, for that matter—would be able to understand them.” OpenPGPjs is a method of encrypting email […]

June 19, 2019

Email Comparison Table

Comparison tables are often used to show the differences between services.  We respect these services, we have reviewed this table with both services and even recommend to them our users when we are not able to meet demand.  This is an analysis of the features we feel are important. ProtonMail strengths not mentioned above: ProtonMail […]

February 18, 2019

Icelandic Privacy Laws

Why Iceland? We host our users’ data on servers in Iceland because this offers the strongest legal protection for email users that want security and privacy.  Here are the reasons why: 1. Iceland Has No Data Retention Laws for Webmail. When you delete an email, it is instantly deleted and no backups are retained.  It’s […]

December 5, 2018

CTemplar Checksum Implementation

Encrypted Email Services Can Hack You Using JavaScript JavaScript can be used to serve malicious code, exploits, or hacks. This is illustrated by Gizmodo, USENIX, Ask Leo, Stack Exchange, ITNEXT, and it is a recurring theme at the hacker conference DEFCON. JavaScript hacks are also the primary way to de-anonymize Deep Web users. In November of 2018, Professor Kobeissi revealed that if JavaScript is required for […]

February 18, 2018