page-loading-spinner
Home Resources Proton Mail
Preparedness

Proton Mail

Your not safe on the Internet until your taking measures to protect your privacy. The Peak Prosperity team uses Proton Mail and its entire suite of privacy-protecting products in order to keep ourselves safe from Big Tech and malicious actors.

The User's Profile AaronMcKeon October 7, 2024
placeholder image

If you’ve been following my work at Peak Prosperity for long enough, then you know I have a serious problem with Big Tech.  Not only have they made themselves a de facto censorship and propaganda arm of the government, but they have no respect for your privacy whatsoever, and email is a big piece of this.  One of their oldest tricks in their playbook is to offer “”free”” email for whomever wants it, and then harvest all your communications.

Remember: if you’re not paying for their product, then you are the product.  Information is gold to these companies, and you’re their number 1 cash crop.

What’s the best way to get Big Brother’s eyes out of your business?  Simple – switch to a provider that values your privacy and doesn’t rely on advertising revenue to support its business.  That’s why the entire team at Peak Prosperity uses Proton Mail, fully-encrypted, private, and secure email.

With Proton Mail, you pay for privacy.  With Big Tech, you pay with your privacy.  Here’s why my entire team uses them:

  • End-to-end encryption between all Proton Mail users and PGP users
  • Password-protected emails for sensitive communications with non-Proton/non-PGP users
  • Open source and audited apps, meaning no hidden agendas hiding in their code
  • Swiss data protection under the Swiss Federal Data Protection Act

But it doesn’t end with email.  With a Proton Unlimited plan, you also access to their email alias, VPN, password vault, and file storage solutions.

Email Aliases

One of my favorite things about Proton Mail is the ability to create email aliases when signing up for new services.  This allows you to protect yourself from SPAM because if somebody starts abusing you, you can simply trash the email alias without needing to delete your actual inbox.  All emails still end up in your regular inbox, but you have the ability to turn people off whenever you like.

To take advantage of using email aliases, you simply have to install the Proton Pass app included with your Proton Unlimited subscription.

VPN

Privacy protection doesn’t stop with email.  Without a VPN, you’re giving up valuable information about yourself and your location that can be taken advantage of by malicious actors.

To make matters worse, not all VPNs are created equal.  Many VPNs retain logs of all your activity, which is no bueno for privacy.  Many VPNs are also quite slow when connected through distant servers, which is no bueno for staying productive.

This is why the entire Peak Prosperity team uses Proton VPN whenever connected to the Internet.

  • No-logs policy so your Internet browsing activity is never recorded
  • Secure Core service to prevent a compromised VPN endpoint server from revealing your IP address
  • VPN accelerator that improves browsing speed by 400% while connected to distant VPN servers
  • NetShield ad-blocking that protects you from malware and web trackers

Password Vault

If you’re like most people, it can be challenging to remember all your passwords.  Perhaps you have stored them in a document on your computer or in your browser’s password manager.  These are all ways to have your passwords become compromised.

Peak Prosperity uses Proton Pass to securely encrypt and store all passwords.  It makes maintaining strong security easy.

  • Generate secure passwords easily whenever creating a new online account
  • Easy sign in the auto-fills your encrypted passwords
  • Secure sharing that allows you to securely share passwords (useful for companies or families)

File Storage

As one last added benefit, secure file storage is included with your Proton Unlimited plan.  Although not as robust as Dropbox for companies and team environments, it’s a great solution for individuals looking to use end-to-end encryption for securely sharing sensitive files.