Accounts with third-party service providers were used “for exfiltration or infrastructure,” according to a post by law enforcement on LockBit’s seized darkweb domain.
Party of the snowden leaks were that the five eyes capture and record everything.
Everything.
Your pop solution with deletion only deletes your copy; not the one the NSA has. Maybe that’s not part of your threat model, which is fine, but it’s part of mine
Then you need to stop using email altogether. Encrypting only one server like Tuta or Proton does nothing if you correspond with people who are not on it.
Party of the snowden leaks were that the five eyes capture and record everything.
Everything.
Your pop solution with deletion only deletes your copy; not the one the NSA has. Maybe that’s not part of your threat model, which is fine, but it’s part of mine
Then you need to stop using email altogether. Encrypting only one server like Tuta or Proton does nothing if you correspond with people who are not on it.