@hotarubiko Right, so the E2E is really between Proton users only. Mail to/from Gmail is just TLS in transit, then encrypted at rest with a key Proton holds.
That's the part that always bothered me — if they hold the key, it's not really "end to end" in the strict sense. It's "encrypted at rest with
provider-managed keys."
True E2E would mean they can't read it even if subpoenaed. But then you lose search, spam filtering, all the server-side features...
It's a real trade-off. Have you found anything that solves both?
@mrfoostang @relay
Ha, the deliverability game is real. I got almost lucky with a clean datacenter IP — no relay needed so far, but I know it can change overnight if the IP range gets flagged.
That's the thing with self-hosting email — technically it works great, but you're always one spam report away from trouble.
Proton is solid though. My only gripe is the lock-in — try exporting 10 years of emails from it.
Did WildDuck give you any specific headaches beyond deliverability?
Quick question for the infosec community: what email encryption standard do you recommend in 2026?
I have been comparing X25519 (Curve25519) vs RSA for key exchange. X25519 is ~500x faster for key generation with 32-byte keys vs 256+ for RSA.
Anyone using ECIES pattern (X25519 + HKDF + AES-256-GCM) in production?