Email Heaven?! PGP Emails to Proton WITHOUT using Proton

You can still send PGP to Proton users without actually using them

Email Heaven?! PGP Emails to Proton WITHOUT using Proton



Are You New?

You DON’T need to know the Linux terminal to follow this article. I only show you the commands so you can learn a little bit.


Can’t Control the Other Party

First of all, a lot of people use vanity domains, so they might be using Gmail or Proton behind the scenes without you even knowing. You can do a DNS lookup to find out what email provider the other person uses. There are a huge number of tools for this, such as bgp.tools, mxtoolbox, and the Linux command line (with tools such as dig or whois):

dig example.com MX  

Note: While bpg.tools is VERY reliable, and the best one in my opinion, they are on cloudflare. While as with dig, you can actually control which DNS server dig uses, such as Quad9:

dig @9.9.9.9 example.com MX

Then the “Whois” command can be installed. For example on Debian/Mint/Ubuntu,

sudo apt install whois  

Then lookup the IP,

whois {IP you got from MX}  



While you can self-host your own email, you can’t pick what provider the other person uses. If they use Gmail or Proton, you can follow these steps below.


Gmail

If they use Gmail, you can try to convince them to use a browser extension such as Mailvelope, or use an email masking service to hide metadata about your identity, such as AnonAddy.


Proton

I’ve shouted from the rooftops dozens of times that Protonmail seems like a honeypot, because they were funded by the EU government (under the Horizons program), go out of their way to collect more data than needed, provide zero metadata protection, and their whole concept of a web app that forces you to give up control of your PGP key, defeats the purpose of end-to-end encryption. And ALL their traffic is routed through the USA’s Cloudflare.


PGP without Proton

However, you can still get pgp encryption even if you don’t use protonmail, but they do. To get the PGP key of the other person use this Linux command, and just insert their username in the {user} section.

curl -s 'https://api.protonmail.ch/pks/lookup?op=get&search={user}@protonmail.com'  

This curl command will print the public key.

Example Output:

Optional,

You can use the “>” symbol to put the key into a file. Public keys use an .asc file extension. So:

curl -s 'https://api.protonmail.ch/pks/lookup?op=get&search={user}@protonmail.com' > name_this_key.asc



Web Browser Version:

If you don’t feel comfortable using the terminal, you can also visit that URL above in a web browser to download it.



Then take this PGP public key, and add it to the contact in your email client. For example in Thunderbird, once it’s set to encrypt, it will warn you to hit “resolve” on missing a key,

“Import Public Keys from File”

Add that .asc file you saved. It needs the .asc file extension.



By default, the subject is NOT encrypted. Proton (or any server) would then see as plaintext. This is what I’d recommend for cold emailing strangers, and just keep secrets out of the subject line.



You can encrypt the subject line, by hitting the “OpenPGP” button, but then it appears to a Proton user with the subject “…”

IF you encrypt the subject THEN they see … as subject:




These emails are encrypted, just as good as if you were using Proton, and effortless for the receiver. In fact, even better security because you did it outside their web app.



It attaches your public key as an attachment automatically to them. This is the proper format for emails, and NOT using Kleopatra to do raw text that is copy-pasted in. Because the copy-paste method forces both you and receiver to do manual work on each back and forth reply.



In conclusion,

With a self-host email server, you can get all of the benefits and network effects of writing PGP to Proton users, while keeping any OTHER emails completely away from them. And even if you write Proton users with this strategy, they can’t see your IP, do packet tracing, or know when you log in. So to say “oh proton has a network effect” is propaganda.



My critics will say that they don’t feel like doing this “work”. But the work is fast if you use the command line, and Proton’s web app is crazy slow to load. All web browsers suck at decrypting apps. So you’re saving time by having it super quick through any real email client.


Need help with self-hosting? We got you,

Get your own Self-host Email Combo Pack




If you really want to learn and take your privacy to the next level, Access our VPN, and subscribe to our new content via: Podcast RSS, Session list, Nostr, Bastyon, Article RSS, or join the Signal Group

Related Posts

Privacy Hell: Proton Uses Cloudflare

Privacy Hell: Proton Uses Cloudflare

How Proton's Negligence Causes Harm

[SP]

Jul 11, 2025

Best Email Client on Android?!

Best Email Client on Android?!

best security features & privacy perks

[SP]

Jan 5, 2025

Protonmail admits it's bullshit

Protonmail admits it's bullshit

This is an article to go with the new Podcast

[SP]

Nov 10, 2024

Get a Free Month of VoIP from JMP Chat?

Get a Free Month of VoIP from JMP Chat?

With a Cloud VPS or DeGoogled Phones

[ADMIN]

May 16, 2024