Privacy guides, threat breakdowns, and product news from the Tobava team.
A race condition in OpenSSH's signal handler allows unauthenticated remote code execution on glibc-based Linux systems. We break down the exploit, show how to check if your server is vulnerable, and walk through the patch process — including Ubuntu backport awareness so you don't get false positives from scanner tools.
Read article →Gmail scans every message to serve targeted ads. Outlook uses "diagnostic data" to improve AI models. Here's how commercial email providers monetise your inbox, and how end-to-end encryption changes the equation.
Read →Deliverability is 80% DNS. If your outbound mail keeps landing in junk, the answer is almost always a missing or misconfigured SPF, DKIM, or DMARC record. Plain-English breakdown with copy-paste DNS entries.
Read →Getting a breach alert is alarming — but most people don't know what to do next. We explain what credential exposure really means, how to check which passwords need changing, and why password reuse is the real threat.
Read →PGP adds a second encryption layer on top of our built-in storage encryption. We walk through generating your key pair inside Tobava Mail and sending your first end-to-end encrypted message.
Read →Why did a cybersecurity firm build an email service? Because we got tired of recommending third-party providers while knowing exactly what flaws commercial providers have. Here's what makes Tobava Mail different — technically.
Read →AI-generated phishing emails now pass grammar checks, mimic your CEO's writing style, and bypass legacy spam filters. We break down what's changed, what red flags still work, and how to train your team to spot them.
Read →