Your password is salted and hashed with Bcrypt on your device before being transmitted to Tutanota. Bcrypt is the most reliable method because brute-force attacks need much more time in comparison to conventional methods such as MD5 or SHA. With this method we guarantee an integrated confidentiality and we allow you to access and decrypt your emails from desktops and mobile devices instantly.</p
Previous Title: No changes recorded
Updated Title: No changes recorded
Previous Analysis: No changes recorded
Updated Analysis: No changes recorded
Previous Status: No changes recorded
Updated Status: No changes recorded
Previous Title: No changes recorded
Updated Title: No changes recorded
Previous Analysis: No changes recorded
Updated Analysis: No changes recorded
Previous Status: PENDING
Updated Status: APPROVED
Previous Title: info given about security practices
Updated Title: Provides information on security practices
Previous Analysis: Generated through the annotate view
Updated Analysis: Under the FAQs, Tutanota gives various information about the service's security practices under the sections "Your Tutanota Password" and "Security and Privacy." Details include the algorithms used to hash passwords, information about encryption algorithms, private and public key information, etc.
Previous Status: No changes recorded
Updated Status: No changes recorded
Previous Title:
Updated Title: info given about security practices
Previous Analysis:
Updated Analysis: Generated through the annotate view
Previous Status:
Updated Status: PENDING