1. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes April 2021

    Welcome to this month’s release notes! Below you’ll find the latest product improvements and news. What’s New Reskin After listening to your suggestions on how to improve your StartMail experience, we are happy to announce that we implemented the full reskin! This includes a new design with tool tips that will guide you and provide […]

    Read more
  2. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes March 2021

    There’s no better way to kick off spring, than with some product updates. Below you’ll find the latest product improvements, promos, and news. What’s New HTTP/2 & TLS 1.3 support We now support HTTP/2 reducing bandwidth usage to make your webmail service faster & TLS 1.3 helping protect your account from attacks and the use […]

    Read more
  3. blogpost-image of the Egyptian statue of the great Sphinx of Giza with an 'I love privacy' sticker

    An Introduction to Cryptography History

    The history of cryptography can be traced down nearly 4,000 years ago with hieroglyphs in ancient Egypt. Although these inscriptions were not completely secret, they incorporated one of the essential elements of cryptography: a deliberate transformation of the writing. (Kahn, 1967) As the need for secrecy and privacy grew, cryptography became a political technology, where […]

    Read more
  4. blogpost-image of a laptop screen being hooked by a fishing lure

    Quick guide to phishing

    It all starts with an email from something that appears to be from a trustworthy source designed to lure a victim. The message could look like a request from the bank, your Internet provider, or even the company you work for or follow. They usually contain a link to click or an attachment to download.

    Read more
  5. blogpost-image of a desktop screen with the facebook logo and a lock

    Quick Guide to Social Media Privacy

    When used correctly, social media can be used for good; it can help promote business, build and maintain connections to family, friends, coworkers, and potential business associates, and provide endless hours of entertainment. By nature, social media sites are used to share user-generated content; it is central to the function of these sites. While this sharing may not necessarily be a bad thing, it is important to be aware of the privacy concerns.

    Read more
  6. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes February 2021

    Roses are red, StartMail is blue, we don’t rhyme very well, but here are the release notes just for you. What’s New Reskin We’ve been working on a fresh look and feel of our Inbox and will release it in parts. The first part is live and kicking! Experience the new style which takes our […]

    Read more
  7. blogpost-image of a laptop displaying a facebook log in screen and a tumbs up icon

    Seventeen Years of Facebook

    Seventeen years ago, roommates Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes published thefacebook.co. Nobody could have foreseen the impact this would bring, having today over 2.5 billion monthly active users worldwide.

    Read more
  8. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes January 2021

    Welcome to this month’s release notes! Below you’ll find the latest product improvements, promos, and news, plus a sneak peek of our product’s reskin!

    Read more
  9. blogpost-image of a laptop displaying Privacy Policy and a checkmark

    Read between the privacy policies lines

    As a citizen of the 21st century, it’s most likely that you have browsed the Internet, shopped online, or even binged on a “television” series. If you have done any of these activities online, you probably have been asked to agree on Terms of Use and Privacy Policies.

    Read more
  10. blogpost-image of a laptop displaying a password field and a lock

    Tips on creating a strong password

    Upper case, lower case, numbers, symbols, the tears of your enemies…a strong password creation sometimes requires thought and patience, and even though we have been using the internet for quite a while, most people still struggle with this task.

    Read more