Because privacy is the most important thing which you have

We evolved a service Encrypted Email to secure your anonymity and safety handing over of messages between people and maximally protect Your privacy. And not only by formal declaration, but by all possible technical means.

Start with encrypted email

Nowadays privacy is the most valuable property

Do not give up of your rights for privacy

Do you think that your messages are unimportant and everyone can read them?

In the old days the envelopes were sealed so they were not available for random reading. Why should we give up of this now?

Technology which guarantees privacy of correspondence

Modern age brings modern communication along, but also modern means of surveillance of things which you write and to whom you write them.

This service allows you anonymity and privacy of your messages. We want that privacy of correspondence stays privacy of correspondence.

Protection of know-how is the path to success

Protect your own privacy, if you want to be free and successful.

You yourselves know, what is the price of information in enterprise. Do not let the rivals to listen in to your internal company communication, to gain Your contacts or offers from customers.

Desire of governments to read private correspondence is rising

Cybercrime grows as fast as technologies. Not only governments and companies, but also individuals are interested in your private correspondence and they want to know everything about you!

Afterwards, they misuse these information for their needs, such as investments or political campaigns.

November 2012

Censorship of internet is one step closer, governments can also snoop on an encrypted content.

Meanwhile all have formed an attachment to an ongoing conference, it came out that ITU has already quietly approved the norm Y.2770 few days ago. It, in a simplified way, allows governments to take a close look on a transmitted content from users even though in case it is encrypted. In this case privacy of users does not exist. The norm itself and any other conclusions were not announced.

January 2013

The American bureaucracy can snoop on anyone, who saves data in clouds services provided by the American.

Experts warn before the usage of american cloud services – the american government can legally inspect data in the cloud discs. This law, which is more known as the acronym FISAAA, allows the american government to arbitrarily spy and examine data which are saved on discs of services such as Amazon Cloud Drive, Google Drive or Apple iCloud.

April 2013

CISPA alias an espionage of internet users is on stage again

Previous week in the american congress, the law about sharing of intelligence information and about protection was passed“ (so called CISPA, Cyber Intelligence Sharing and Protection Act). Many specialists warn before the new law, as before the worse brother of previous agreements PIPA, SOPA, ACTA etc., which due to resistance of the public did not passed.

Similar tactics of intimidation are used also by other politicians. Republican MP Mike McCaul justified the necessity of passing of the law with the bomb attack in Boston, which has happened only three days before the vote itself.

June 2013

James Clapper a director of the american national secret service condemned media for an imprudent release – as he expressed – information about secret programmes of american special services.

According to his words, the publications, related to programmes in a field of collecting information about private people on the internet and through the telephone companies in the Washington post and the Guardian journals, caused great damage. In a context with it, Clapper also declared that he will require an initiation of a criminal investigation.

June 2013

The USA confessed the espionages. The secret NSA collects private data across the whole world.

The government‘s secret agency NSA allegedly has a mass and unlimited access to privacy data of users. The secret operation PRISM concentrates on the whole world except America. Between servers, which provide the access to data, allegedly belong Facebook, Google, Microsoft, Yahoo and five other american companies.

June 2013

American president described surveillance of phone calls and internet users as a necessary evil for securing the safety of american citizens.

The Guardian journal came out with the news, according to it a cooperation with the NSA has been ordered to the american operator Verizon by court order. The Verizon handed millions of phone call recordings to the NSA under that order.

Subsequently, it came out that the NSA directly hacked into servers of nine internet companies. Among them belongs Facebook, Google, Microsoft or Yahoo. Mark Zuckerberg marked this information for scandalous and denied conscious involvement in the programme. Representatives of the other involved sides expressed themselves in a similar sense.

July 2013

American congress gave „thumbs-up“ to a home espionage.

After an intensive pressure of obama’s government and top representatives of secret services, the american parliament rejected an amendment, which would restricted authorities of the National security agency with connection to the espionage of Americans.

September 2013

Nevertheless, take it into account that the news, which were published by New Your Times about powers of NSA and their breaking through encryptions, indicates that VPN technologies and a popular web protocol SSL are two encryption methods, which are specifically aimed by the american government.

Schneier recommended to use the TLS and Ipsec on the web communication front whenever it is possible.

January 2014

Ron Paul: The Congress even supports Obama in an espionage.

The thing, in which it is totally different, is the reality that the current Congress acts as a defence lawyer of a continuation of these executive abuses and as an opponent of civil freedoms of american citizens. The congress not only – without several rare exceptions – accepted a programme of a mass espionage of american citizens via NSA, but in reality it even encouraged the president to continue with this programme and expand it.

April 2014

Edward Snowden — the man, who showed a huge extent of a state espionage.

Edward Snowden: „The NSA built an infrastructure, which allows them to eavesdrop almost anything. Communication of a majority of a mankind is automatically analyzed through this ability without any focus. If I would like to go through your emails, it would suffice me to use this infrastructure. I can find your mails, passwords, phone recordings, kredit cards. I do not want to live in a society, which does such things. I do not want to live in the world, where everything what I do or say is recorded. I do not want to live in it nor support it.“

June 2014

Governments snoop phones through their own cable with operators.

The latest report of a mobile operator Vodafone brings statistics of the government’s espionage in the Czech Republic and in the world. It also clarifies the way and law footing, which is used by the government to get the data.

September 2014

Yahoo $250,000 daily fine over NSA data refusal was set to double every week.

The espionage of internet users had probably wider dimensions than it seemed and companies were completely helpless against secret services. In 2008, the U.S. government reputedly threatened the internet company Yahoo under the penalty of 250.000$ USD per day if they refuse to give personal data of their users to agents.

November 2014

New tool for spy victims to detect government surveillance.

Amnesty International (AI) warns that we recently observe extraordinary boom of technologies, which are used to snoop on and spy on. Different kinds of spyware can read emails, eavesdrop a conversation through Skype or even turn on a microphone or video camera from afar, without the computer owner would be aware of it.

January 2015

Prime minister Cameron: Communication, which we cannot snoop, we will forbid.

In the lights of the attacks on the french satirical weekly magazine Charlie Hebdo, the British prime minister David Cameron feels being empowered to require a ban of all means of encrypted communication, which government agencies are not able to decode.

January 2015

EU countries in droves begin to strengthen secret services and law-enforcement agencies. They start with a higher level of espionage. Politicians always relate the espionage to terrorists. But it concerns all of us, so non-terrorists as well.

Austria will prepare the action plan for the fight against terrorism. Belgium goes further. They think, whether they will mitigate rules for a police usage of eavesdropping and espionage of electronic communication of people who are suspicious of terrorism.

The unbalance is huge today. Nobody from the outside does not control live actions, nobody sees into secret services. They are worlds just for themselves.

February 2015

If you have your mobile phone with you and it is turned on, then your mobile operator knows, where to find you. So all your moves are under control and the operator has a duty to save these data. So the police, secret services or even the central bank can exact them.

Chat on Facebook, which is designated for discreet communication between two users, is being tracked by Recorded Future company, which is found in Sweden. This company is connected to CIA and is interested about (except terrorists and cyber crime) all activities on the internet, which have something to do with possible threats (What should we imagine behind this?).

February 2015

Lenovo loads dangerous Superfish adware onto new computers.

Lenovo installed into new computers dangerous adware and an MITM tool, which went so far that it input false certificate authorities and hacked into encrypted connections. Naturally, it was pierced and misuse-able by attackers. And for the PR of Lenovo, it was an argument for nonsenses about the things that Lenovo did for the well being of customers. And how everyone is actually crazy and does not understand Lenovo.

May 2015

After the terrorist attacks on the redaction of Charlie Hebdo, France accepted perhaps the most severe surveillance laws in Europe, but they didn't prevent to terrorist attacks.

According to the investigation of independent commission, it has been find out that in any of twenty-five well-known cases, terrorists weren't convicted thanks to eavesdropping of NSA. Recently, this group of activists against the intrusive surveillance had a meeting with president Obama and thanks to their analysis Liberty and Security in Changing World, which they handed over in the White House, has begun to talk about the intrusive surveillance and what is it good for. The intrusive surveillance of the whole population for billions, which come from taxes of European and American taxpayers, is according to the latest study in fact without any good in a view of a fight against terrorism.

June 2015

The police want access to data of IP addresses and newly also to all email communication. They desire after them so much that they refer to distorted version of european instructions, which were cancelled by the Court of Justice of the European Union in that time.

Providers of internet services will be obliged to keep data about final IP addresses for an amount of six months and to offer on a request. The essential reproof of collecting IP addresses of recipients, which are obtained in this way, is noticeable risk of a misuse for a possible very easy discrediting of any person.

July 2015

IT specialist, so-called ethical hacker Lukas Novy, describes in an interview, what was the special pirate programme able to do, which the police secretly bought for millions of crowns.

After the leakage of information from the Italian hacker company, the police had to admit they paid secretly millions of crowns to this company for a special software in the last five years, thanks to it the police could hack into any computer or phone after a permission of the law court.

HT produced and provided practically a complete spy software, which was able to effectively do all the steps and phases of a breakthrough into the computer system: from a survey of a target and looking-up of safety problems through a remote installation of an operating software to an analyze of stolen data and also a production of a fake evidence in an affected system.

July 2015

The Czech police spied on commercial banks.

New information in the affair of WikiLeaks, which point out the Czech police spied on commercial banks and also news servers including Protiproudu. So the Czech Republic was definitively integrated among developed countries. The police espionage achieves the western level also in our country. The question is, whether we wished something like this in 1989. The Czech police was reputedly getting ready to observe an operation of internet on a large scale. In order to do it, it is believed, they got tailor-made viruses done, which they would send to chosen websites. Also the website Parlamentní was supposed to be in a view of police hackers.

These techniques ilustrate practices of the police in the whole European Union.

August 2015

Germans are so scared of surveillance they microwave their ID cards.

It is said the young Germans are scared. It is showed by that they buy old typewriters, writing papers and they use microwaves in a curious way. Because our western neighbours are scared of the Big Brother and they search for ways how to avoid him. After the espionage affair, which was given rise by a former contractor of American secret services Edward Snowden, the sale of old typewriters and also writing papers went up.

October 2015

European Union's top court strikes down US-EU data

The court said Safe Harbour did not sufficiently protect EU citizens' personal data as American companies were "bound to disregard, without limitation" the privacy safeguards where they come into conflict with the national security, public interest and law enforcement requirements of the United States.

"The Court of Justice declares that the commission's US Safe Harbour decision is invalid," the court said.

The ruling follows revelations from former National Security Agency contractor Edward Snowden about the Prism program that allowed US authorities to harvest private information directly from big tech companies such as Apple, Facebook and Google.

October 2015

Police to be granted powers to view your internet history

Police are to get the power to view the web browsing history of everyone in the country. It would make it a legal requirement for communications companies to retain all the web browsing history of customers for 12 months in case the spy agencies or police need to access them.

Police would be able to access specific web addresses visited by customers.

The new powers would allow the police to seize details of the website and searches being made by people they wanted to investigate.

October 2015

British spies need our data, and we should let them have it

In a few weeks, MPs will be discussing whether it’s time to rein in our real-life computer surveillance programmes. David Cameron wants to tidy the almighty mess of Britain’s snooping regulations, presenting a dangerous moment for our spies. Since Edward Snowden leaked details of what he claimed was a GCHQ mass surveillance programme, there have been suspicions that the spooks can’t really be trusted with their new powers and that they’re reaching too far, too fast.

May 2016

Big Data Breaches Found at Major Email Services

Hundreds of millions of hacked usernames and passwords for email accounts and other websites are being traded in Russia's criminal underworld, a security expert told Reuters.

It is one of the biggest stashes of stolen credentials to be uncovered since cyber attacks hit major U.S. banks and retailers two years ago.

August 2016

FBI probe of Clinton's emails prompted by espionage fears

Two secret letters the FBI sent to the State Department have revealed for the first time that the bureau's investigation into Hillary Clinton's private email server, and the classified emails sent through it, stemmed from a so-called "Section 811" referral from the Intelligence Community's Inspector General (ICIG).

The ICIG determined that classified, national security information in Clinton's emails may have been "compromised" and shared with "a foreign power or an agent of a foreign power."

September 2016

Hacked Dropbox Data of 68 Million Users Is Now for Sale on the Dark Web

Hacked user credentials can be very valuable among data traders. Email and password data is typically bought and sold on the darknet, a tier of anonymous and largely untraceable Internet access that is often used for illegal activity such as drug or firearms trading. Large numbers of stolen user data can be integrated with software that automatically cycles though email/password combinations in order to hack into different websites.

September 2016

Yahoo 2014 Hack Steals Personal Information From at Least 500 Million Accounts

Computer hackers swiped personal information from at least 500 million Yahoo accounts in what is believed to be the biggest digital break-in at an email provider.

Yahoo says it has more than 1 billion monthly users, although it hasn't disclosed how many of those people have email accounts. In July, 161 million people worldwide used Yahoo email on personal computers.

September 2016

China cyber espionage continues

U.S. Cyber Command recently reported within secret government channels that China is continuing aggressive cyber espionage against American companies.

The U.S. company was not identified by name. But the hacker group behind the data theft is part of the Ministry of State Security, China’s main police and intelligence service.

September 2016

Apple Logs Your iMessage Contacts — and May Share Them With Police

According to a document obtained by The Intercept, your blue-bubbled texts do leave behind a log of which phone numbers you are poised to contact and shares this (and other potentially sensitive metadata) with law enforcement when compelled by court order.

This log also includes the date and time when you entered a number, along with your IP address

October 2016

Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence - sources

Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

November 2016

The UK's far-reaching surveillance bill is now all but law

One of the headline powers included in the IP Bill is the requirement for communications service providers -- think ISPs and mobile carriers -- to collect and store Internet Connection Records (ICRs) for 12 months. And provide government agencies access to them, of course.

ICR retention will affect everyone, and it's one of the key intrusive powers included in the IP Bill. It could be some time before your ISP is physically capable of capturing and storing your browsing history and other online activity, though.

February 2017

Google, unlike Microsoft, must turn over foreign emails: U.S. judge

A U.S. judge has ordered Google to comply with search warrants seeking customer emails stored outside the United States, diverging from a federal appeals court that reached the opposite conclusion in a similar case involving Microsoft Corp (MSFT.O).

U.S. Magistrate Judge Thomas Rueter in Philadelphia ruled on Friday that transferring emails from a foreign server so FBI agents could review them locally as part of a domestic fraud probe did not qualify as a seizure.

February 2017

The Beckham's leakage may happen to all of us

Most of us believe that private communications should be private. Most of us believe that people’s private communications should not be hacked. And yet whenever they are hacked and then released we cannot help but crawl over the results.

March 2017

CIA malware targets iPhone, Android, smart TVs

According to newly released WikiLeaks documents, the CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman and collect audio and message traffic before encryption is applied.

March 2017

Microsoft and Samsung react to Vault 7 CIA leaks — Google, Linux Foundation and others remain silent

The Vault 7 document and code cache released by WikiLeaks revealed that many big software companies were being actively exploited by the CIA. Apple, Microsoft, Google, Samsung, and even Linux were all named as having vulnerabilities that could be used for surveillance.

April 2017

Leaked emails reveal Shell’s ties to convicted money launderer

Anglo-Dutch oil company Shell has been hit by fresh corruption allegations after a series of leaked emails revealed the company's ties to convicted money launderer Dan Etete.

On April 20, Italian prosecutors will decide whether to pursue criminal charges against Shell and its partner Eni. As the leaked emails continue to circulate, Shell may well come under pressure to overhaul its internal controls and corporate governance, in addition to ramping up its lax anti-corruption measures.

April 2017

Email Leak Reveals Trump Syria Attack Subject Of Great Concern In Las Vegas

Stunning emails and voicemails sent to publisher Jerome Almon indicate that President Donald Trump's Tomahawk attack has led to a flurry of terrorism preparation in Las Vegas, Canada, and Europe. Almon has released a stunning series of FBI voicemails and emails from the mayor of Las Vegas concerning a known terrorist plot against Sin City on his new media site.

May 2017

French candidate Macron claims massive hack as emails leaked

Leading French presidential candidate Emmanuel Macron's campaign said on Friday it had been the target of a "massive" computer hack that dumped its campaign emails online 1-1/2 days before voters choose between the centrist and his far-right rival, Marine Le Pen.

"The En Marche! Movement has been the victim of a massive and co-ordinated hack this evening which has given rise to the diffusion on social media of various internal information," the statement said.

Right now…

Our goal is to enable an anonymous and safety handing over of messages between people

Towards to the freedom, we deem for our duty to enable an anonymous and safe handing over of messages between people in a way that their privacy would be maximally protected and not only by a formal announcement, but by all available technical means.

That's why we provide this service for free.


You are the one, who has the key to the content and nobody else.

We are not able to find out, who‘s the sender and who’s the recipient of messages.

Neither the operator of the server, nor attackers or authors of this product aren't technically able to read messages from your box without your help.

The system is built up that no one, except you, can’t get in.


The messages cannot be eavesdropped, simply because of that you don’t send them anywhere.

You safely encode the content of your message already on your-side with your password and private key and encrypted messages will be saved on the server. Your commands are also carried out on an encrypted channel.

Also the attachments of your emails are encrypted, i.e. documents, which you save.


Because we don’t have an access into your box, your mails will be lost forever as you forget your password.

The password nor the private key cannot be restored at our place.

If the box for messages is not active over a half of a year since the last activity, it will be automatically rescinded.

Mails cannot be searched, we don't know their content, not even we don’t want to know it.


We are not able to find out, what you saved on our server and what is a content of your messages.

We don’t log nor save your IP address.

We are not able to find out the message recipient and sender, we only use hash.


If you will be forced to give up the password, you can set a password, which will erase your messages.

After ten wrong attempts, the box will be blocked for an hour. At this time, it will not be able to get in.

The new message from the UN underlines the importance of encryption and anonymity in a digital age.

David Kaye:
A special reporter of the UN for the area of a freedom of speech.

„In such an environment, a use of the VPN or TOR or proxy server in a combination with an encryption can be the only way, how people can get and share informations.

The encryption enables people to avoid to aggressive censorship, it allows to spread information behind borders. In addition, people cannot influence and quite often they are not aware of that their communication oversteps state borders. Encryption and anonymity can protect information that are going through servers in the third countries, which apply censorship. An important role has to be confessed to anonymity when it protects and asserts privacy, a freedom of speech, but also in the enforcement of political responsibility with the participation of citizens in public-things and in discussions.”

About us

We are people, who work in a field of information technologies, to whom it isn't indifferent in what world we live and so we believe in a free sharing of information of a simple censorship.

We are also convinced that privacy and anonymity are basic features of an open democratic society, which, thanks to this belief, allows to use a full potential and opportunities of digital technologies. Therefore, we don’t want to accept the enforced loss of privacy that is connected with the government’s efforts and some multinational corporations to know everything about us.

Because at the beginning was the word and then came the action, we decided to create this product.

Do you want to join?

Safety issues are very complicated and with a regard of our limited sources, we will be very glad if you will help us to improve this product.

Join Us

For hackers: Put your own suggestions into the root directory of a ROOT user into the file my_comment_HASH.txt