The page is currently a work in progress due to TorBirdy incompatibility with the latest Thunderbird release, see: TorBirdy does not support Thunderbird 68 [archive]. The eventual solution will require a host of manual Thunderbird preference changes to use encrypted email safely.
Gratitude is expressed to tempest for permission to use this material for the Whonix ™ wiki documentation.  This material forms chapter 4.6 of A Beginner Friendly Comprehensive Guide to Installing and Using a Safer Anonymous Operating System, which can be found here [archive]. Minor editorial changes have been made to the source material, along with additional Qubes-Whonix ™ steps and wiki / external references where appropriate.
Due to the complexity of software in the past, one of the most underutilized forms of protection for users is email encryption. However, it is now easier to take advantage of encrypted email via the use of Thunderbird (Mozilla's email client) and Enigmail, which is a graphical front-end for using the GnuPG ("GPG") encryption program. Unfortunately, the TorBirdy extension is no longer available to make Thunderbird connections take place over the Tor network.  This necessitates a number of manual preference changes in Thunderbird to use email safely.
It is estimated that within 10 to 15 years, Quantum Computers will break today's common asymmetric public-key cryptography algorithms used for web encryption (https), e-mail encryption (GnuPG...), SSH and other purposes. See Post-Quantum Cryptography (PQCrypto).
Encrypted subject and references headers are also now possible in Enigmail, reducing the leakage of metadata.   However, MIME is not used in these instructions to reduce the risk of Enigmail bugs exposing unencrypted messages, meaning the subject line will not be encrypted. On the upside, this configuration change allows the user to confirm their message is actually encrypted before it is sent.
To minimize these risks and improve security, the following guide uses a suitable Desktop Email Client instead of webmail, paired with strong, end-to-end encryption that protects the contents so it can only be read by the intended recipient. Further, a strong encryption key-pair is created so the user has strict control over the private key, which is stored securely. Keep in mind this method does not make email infallible -- advanced adversaries can easily penetrate Internet-facing endpoints of targets with today's cutting-edge surveillance and offensive systems. Also, mistakes or poor security practices on behalf of the email recipient can inadvertently lead to disclosures of plaintext.
Tip: If possible, critical information that is of high value should not traverse computer networks at all, or even risk exposure to Internet-facing computers.  High-risk users might also consider combining the use of One Time Pads with email encryption for even greater security, and creating an airgapped OpenPGP key pair rather than relying on Enigmail as per these instructions.
The following guide provides steps to:
- Install the Thunderbird email client.
- Install the Enigmail add-on for Thunderbird.
- Due to the unavailability of the TorBirdy plugin, configure Thunderbird preferences for safe use of email.
- Create an email account anonymously with a suitable provider via Tor Browser.
- Store the login credentials in KeePassXC [archive] (optional). 
- Setup the new email account: Thunderbird account settings, install necessary extensions (add-ons), and enforce connections to the email provider's Onion Service.
- Create an OpenPGP encryption key pair and revocation certificate using the Enigmail Setup Wizard.
- Encrypt and store the revocation certificate securely.
- Configure Thunderbird preferences for greater security and anonymity.
- Configure additional OpenPGP preferences via Enigmail.
- Key management: import GPG public keys.
- Export the public key to a GPG key server (optional).
- Prepare an email signature with the public GPG key ID and fingerprint (optional).
- Compose and send a test encrypted email to danwin1210.me
- Open an encrypted email received in Thunderbird.
Due to email's design, it is a very insecure system where privacy and anonymity are concerned. Use it sparingly, and only with great discipline and caution.
Operational security is imperative to maintain the integrity of properly encrypted email. Consider the following scenarios which would allow an adversary access to the plaintext or other metadata that might help deanonymize a user:
- Even if all email sent to a recipient is encrypted, if the recipient fails to encrypt the email response, then adversaries will be able to read the message and likely a quote of the original one sent.
- The names of email recipients cannot be encrypted and are therefore visible to adversaries. The subject line and references email header will also be visible in the following configuration.
- There are several different types of metadata [archive] that can be harvested from email, depending on how it is used. Therefore, users must be careful when relying on email for sensitive communications.
Terms that are commonly used in reference to email encryption are outlined below.
Table: Email Encryption Terms 
||A pair of asymmetric keys, commonly known as public and private keys.
||The half of a key pair that is distributed publicly and used for encrypting.
||The half of a key pair that is kept secret, and is used for decryption.
||A server or website used for the distribution and verification of public keys.
||A verification that the enclosed contents have not been tampered with in transit.
||A verification that the enclosed contents are unreadable, except for the intended recipient.
||A verification that the person who is sending / signing is who they say they are.
||Assurance that nobody, including the author, can dispute the origin of the message itself.
||Commonly referred to as a 'keypair'. It is two separate keys: one public, one private.
||Symmetric encryption depends on using a password to encrypt the single key used for both encryption and decryption.
Warning: Unless otherwise instructed to do so, manual installation of packages should be avoided, even trusted ones. To install software users should prefer the APT secure package manager. For more information on this, See: Installing Software Best Practices.
Install the Thunderbird Email Client
For users that would like to learn more about Thunderbird refer to the official support page [archive]. However, modifications should not be made to Thunderbird unless you know what you are doing.
The Thunderbird email client can be installed from the konsole using
APT secure package manager.
In Whonix-Workstation ™ (
whonix-ws-15 TemplateVM Qubes-Whonix ™) konsole, run.
sudo apt-get install thunderbird
Note: If the following output appears Thunderbird is already installed and no further action is needed.
Reading package lists... Done
Building dependency tree
Reading state information... Done
thunderbird is already the newest version.
Install Enigmail Add-on for Thunderbird
Enigmail provides Thunderbird users with access to the authentication and encryption features provided by GnuPG [archive]. For a full listing of features and and configuration options see the official Enigmail Documentation [archive].
Enigmail add-on can be installed from the konsole using
APT secure package manager.
In Whonix-Workstation ™ (
whonix-ws-15 TemplateVM Qubes-Whonix ™) konsole, run.
sudo apt-get install enigmail
Note: If the following output appears Enigmail is already installed and no further action is needed.
Reading package lists... Done
Building dependency tree
Reading state information... Done
enigmail is already the newest version.
Change Thunderbird Preferences
TODO: Insert manual Thunderbird preference changes for equivalent TorBirdy effect (see Tails changes).
Create a New Email Account with Tor Browser
Choose an Appropriate Email Provider
First and foremost, there are multiple email providers that users can choose from. For the purpose of this tutorial, danwin1210.me is used as an example. This is not an endorsement for danwin1210.me, nor are they necessarily the most secure or private email provider available. Refer to the list of Onion Service Providers for possible alternatives.
At the time of writing, danwin1210.me is one of the few free and reliable email providers offering POP3 email access through an .onion address, which does not require additional verification details to register an account. You will have 25MB of disk space available for your emails. For more details regarding the features and offerings of danwin1210.me, visit http://danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5ubupvtpid.onion/mail/index.php [archive]. If used properly with GPG encryption, this onion email service will provide the user with strong anonymity and privacy.
If problems are experienced with danwin1210.me, refer to the list of providers [archive] recommended by The Tor Project, Whonix ™ and JonDonym [archive].
Never forget this is an Onion Service which means there is no way of determining who is running it. If GPG is not used to encrypt email and/or the recipient of email does not encrypt it either, it can be easily read by the email service provider, random computers on the internet that relay a sent email message, or anyone else who manages to gain access to the account!
It is critical to create a new email account anonymously with Tor Browser. In Whonix-Workstation ™ (Qubes-Whonix ™:
anon-whonix), launch Tor Browser via the icon on the toolbar (Non-Qubes-Whonix ™) or via the Qube Manager (or widget).
When Tor Browser opens, type.
Into the URL bar to navigate to the danwin1210.me Onion Service web page.
Figure: danwin1210.me Onion Service
1. Create an email account name and password for the mail provider.
- When the page opens, open up KeePassXC and create an account and password entry for your new email account. Alternatively, write it down at home and store it in a safe place.
- When finished creating your password in KeePassXC, type the email name you wish to use in the field under "Username."
- Copy the password you created in KeePassXC and paste it into the fields under "Password" and "Password (again)."
- Finally, click on the "Add Mailbox" button.
Figure: Email Registration
After the page reloads, a new email account name and password can be created.
2. Confirm successful creation of the anonymous account.
If the account was created, the page will reload and you will see a message informing you that "the mail box [YourEmail]@tt3j2x4k5ycaa5zt.onion has been added to the mailbox table" at the top of the page.
Figure: Account Confirmation
3. Close Tor Browser
Once the email account is created, Tor Browser can be closed.
Setup the New Email Account
1. Open Thunderbird.
Click the blue "K" start button →
Select "Mail Client"
- Qubes-Whonix ™:
Click the blue "Q" button →
Click on anon-whonix →
Figure: Thunderbird Email Client (Non-Qubes-Whonix)
2. Set up the Email Account.
IMPORTANT NOTE: Never use Thunderbird to save the email account password! Thunderbird does not store passwords in an encrypted format. Therefore, if Whonix-Workstation ™ (
anon-whonix) is compromised in the future, an attacker may be able to gain access to the email account if they view Thunderbird's unencrypted password storage file.
The first window that will appear upon running Thunderbird for the first time will prompt you to "Set Up an Existing Email Account." Follow these steps:
- Type the alias that you wish to use in the field next to "Your name." This will appear next to your email address in emails you send to others.
- Type the danwin1210.me email address you just created into the field next to "Email address." In the example below, it is "email@example.com"
- Finally, uncheck "remember password" and click the "Continue" button.
Figure: Email Account Set Up
3. Configure the danwin1210.me Hidden Server (Onion Service)
In the next window, you need to configure Thunderbird to connect to the hidden server of danwin1210.me. The fields you need to change are highlighted in red.
- Type tt3j2x4k5ycaa5zt.onion in the field next to "Server Name."
- Type the user name you chose earlier into the field next to "User Name."
- Click the pull down window next to "Connect security" and choose "None."
- Uncheck the box next to "Leave messages on server."
- Check the box next to "Empty Trash on Exit" and continue to the next step.
Note: The lack of "connection security" simply means that Thunderbird will not use SSL or STARTTLS to encrypt your password when it is sent to the mail server. This does not matter in this instance because the mail server is a Tor Onion hidden service. All communications to Tor's ".onion" domains are encrypted. Therefore, your password is not transmitted insecurely.
Figure: Server Configuration
4. Configure Thunderbird folders.
Click on "Copies and Folders" in the left column. Each option to change is highlighted in red in the figure below:
- In the pull down menu next to "Sent Folder on", select "Local Folders."
- In the pull down menu next to "Archives Folder on", select "Local Folders."
- In the pull down menu next to "Drafts Folder on", select "Local Folders."
- In the pull down menu next to "Templates Folder on", select "Local Folders."
- Check the box next to "Show confirmation dialog when messages are saved."
Figure: Folder Configuration
5. Empty Thunderbird trash on exit.
Click on "Local Folders" in the left column. Then, check the box next to "Empty trash on exit."
Figure: Empty Local Folders
6. Configure the outgoing server.
Click on "Outgoing Server (SMTP)" in the left column. Then, click on the "Edit" button.
Figure: Outgoing Server Configuration
In the next window that appears:
- Type tt3j2x4k5ycaa5zt.onion (or alternative .onion) in the field next to "Server Name."
- Click on the pulldown menu next to "Connection security" and select "None." 
- Type the complete email address into the field next to "User Name."
- Set the number in the field next to "Port" to "25."
- Click the "OK" button.
Note: The lack of "connection security" simply means that Thunderbird will not use SSL or
STARTTLS to encrypt your password when it is sent to the mail server. This does not matter in this instance because the mail server is a Tor Onion hidden service. All commonunications to Tor's ".onion" domains are encrypted. Therefore, your password is not transmitted insecurely.
Figure: Onionized Server Configuration
7. Confirm settings and exit.
After returning to the "Account Settings" window, click the "OK" button.
Figure: Confirm Settings
Create an OpenPGP Key Pair and Revocation Certificate
There are two methods for creating an OpenPGP key pair and revocation certificate -- using either the Enigmail Setup Wizard, or manually creating them from the command line. The easier Enigmail method is outlined below, but the manual creation of stronger keys from the command line is recommended for advanced users or those at high risk.
Launch Enigmail Setup Wizard
To start the Enigmail Setup Wizard, after returning to the main Thunderbird window, click the "hamburger" icon that has the 3 horizontal bars towards the upper right corner.
Then, hover the mouse over "Preferences" and click "Menu Bar" when the next menu appears.
Figure: Menu Bar
A menu bar will now appear towards the top of the Thunderbird window. In the menu bar, click "Enigmail" and then click "Setup Wizard."
Figure: Enigmail Setup Wizard
You will now be brought to the Enigmail Setup Wizard. Select "Start setup now" and then click on the "Next" button.
Figure: Start Enigmail Set Up
Create an OpenPGP Key Pair
1. Access Enigmail's extended configuration options.
After the Enigmail Setup Wizard starts, on the next screen click the circle next to "I prefer an extended configuration" and then click the "Next" button.
Figure: Extended Enigmail Configuration
2. Create a new key pair.
Next, a prompt will appear to either create a GPG keypair or use an existing one.
Click the circle next to "I want to create a new key pair for signing and encrypting my email" and then click the "Next" button.
Figure: Create a New Key Pair
3. Create a strong passphrase for the key pair.
In the next window that appears, a prompt will appear to create a passphrase for the GPG private key.
This passphrase should be long and random! You will need this passphrase to sign messages with GPG or to decrypt messages sent to you.
With a strong passphrase, if the machine is ever compromised and someone steals the GPG secret key, this provides an extra layer of protection to prevent the attacker from being able to easily decrypt emails sent to you, or to impersonate you by signing emails with the GPG key.
- Type an appropriately secure and random passphrase into the fields under "Passphrase" and "Please confirm your passphrase by typing it again."
- Then, click on the "Next" button.
- Optionally create a new entry in KeePassXC to store the GPG passphrase and manually enter the passphrase into the new entry. Then, save the KeePassXC database. This will be useful if the GPG passphrase is forgotten. 
Figure: New Key Pair Dialog
4. Wait for the key pair creation process to finish.
A window will appear that shows the progress of your key creation. Move your mouse or browse the web in order to speed up the process if needed.
Figure: New Key Pair Creation
5. Finalize the procedure.
A notice will appear once the process has finished.
Figure: Successful Key Pair Creation
Click the "Close" button and you will see that the progress bar for your key pair generation has reached it's
end point. Click the "Next" button.
Figure: Complete the Procedure
Create and Store a Revocation Certificate
1. Create a revocation certificate.
After Enigmail has finished creating the new GPG key pair, click the "Create Revocation Certificate" button.
Figure: Create a Revocation Certificate
2. Enter the passphrase.
A prompt will now appear to enter the passphrase created in the last step. Paste the GPG passphrase from KeePassXC (or enter it manually) into the "Passphrase" field and click the "OK" button.
Figure: Enter the GPG Passphrase
3. Choose the location for the revocation certificate.
The next window will ask where the GPG revocation certificate should be stored.
Click on "Home" in the left column. Next, replace the spaces and parentheses signs with periods in the default filename for the GPG revocation certificate. The spaces and parentheses signs in the default name can make a step later in this guide trickier. Finally, click the "Save" button.
Figure: Store the Revocation Certificate
4. Confirm the certificate was created.
Next, a message will inform that the GPG revocation certificate was successfully created. Click the "OK" button.
Figure: Certificate Creation Confirmation
Go back to the Enigmail Setup Wizard window and click the "Next" button.
Figure: Continue to Enigmail Final Steps
6. Upload the public key to a keyserver.
The next window will prompt to upload the public key to a keyserver. Click the box next
to "Upload to the global OpenPGP keyservers" and then click the "Next" button.
Figure: Upload Public Key
7. Finalize the Enigmail procedure.
The next window will inform you that Enigmail is now ready to use. Click the "Finish" button.
Figure: Finalize Enigmail Procedure
Encrypt the Revocation Certificate
The revocation certificate will now be encrypted and stored in the persistent storage directory. The GPG revocation certificate can be used to revoke the public encryption key that is added to key servers, even if access to the GPG secret key is lost or the password is forgotten.
If an attacker accesses the GPG revocation certificate, they can revoke the keys. Encrypting the GPG revocation certificate with a passphrase that is easily remembered will protect against this action.
1. Open up a Konsole / Terminal session to get a command prompt.
Click the "K" start button →
- Qubes-Whonix ™:
Click the "Q" taskbar button →
Figure: Open a Terminal (Non-Qubes-Whonix)
2. Create a storage location.
When the terminal window opens, create a directory in the persistent storage folder to store the encrypted GPG revocation key. Run the following commands.
3. Encrypt the revocation certificate.
In the command below, replace "RevocationCertificateFileName" with the actual name of the revocation certificate. Type.
gpg --cipher-algo AES256 --symmetric RevocationCertificateFileName
A prompt will appear to "Enter passphrase." Choose a strong passphrase and enter it into the passphrase field, then click the "OK" button. Also consider creating a new entry in KeePassXC to store the GPG revocation certificate passphrase (manually enter the passphrase into the new entry, then save the KeePassXC database). 
Figure: Passphrase Prompt
A prompt will appear, asking for the passphrase to be re-entered. Type it again into the passphrase field and click the "OK" button.
Figure: Passphrase Confirmation
This passphrase should be strong and unique! Do not re-use passphrases for multiple functions, activities or accounts. If the revocation certificate ever needs to be used, then this passphrase is first used to decrypt it.
Note: If an error appears that states.
gpg: error creating passphrase: invalid passphrase
Then a typo was made somewhere in the last two steps - start over from the beginning of this section.
4. Move the revocation certificate.
If no error messages appear and the user is returned to the command prompt, type.
mv *.gpg storage/gpg-revoke
5. Test decryption of the revocation key.
In the future, if the revocation key is ever needed, decrypt it by typing.
gpg -o RevocationCertificateFilename.asc -d \~/storage/gpg-revoke/RevocationCertificateFilename.gpg
6. Shred the unencrypted revocation certificate that is sitting in the home folder.
sudo shred --remove RevocationCertificateFileName
Type exit to close the terminal and return to Thunderbird.
Final Thunderbird Preferences and Settings
General Thunderbird Preferences
1. Set the Menu Bar.
- Return to the main Thunderbird window.
- Click on the button with the 3 horizontal lines ("hamburger icon") toward the upper-right corner of the Thunderbird window.
- Hover the mouse pointer over "Preferences."
- When the next context menu appears, check the box next to "Menu Bar."
Figure: Thunderbird Menu Bar
2. Access Thunderbird preferences.
In the menu bar, click on "Edit" and then click "Preferences."
Figure: Thunderbird Preferences
3. Disable search and indexing functions.
- In the window that appears, click the "Advanced" tab.
- Uncheck the box next to "Enable Global Search and Indexer" (this will save disk space).
- Click on the "Return Receipts" button.
Figure: Disable Global Search and Indexer
4. Disable the return receipt function.
In the next window that appears, mark the circle next to "Never send a return receipt." Then, click the "OK" button.
Figure: Disable Return Receipts
5. Disable the crash reporter.
After returning to the "Thunderbird Preferences" window, click the "Data Choices" tab. Then, uncheck the box next to "Enable Crash Reporter."
Figure: Disable Crash Reporter
6. Disable website history.
Next, click the "Privacy" button. Then, uncheck the box next to "Remember websites and links I've visited" and click the "close" button.
Figure: Modify Privacy Settings
Some further changes are required that were unaddressed by Enigmail Setup Wizard.
1. Modify OpenPGP settings.
On the main Thunderbird window, click on
Figure: Thunderbird Account Settings
In the window that appears:
- Click on "OpenPGP Security" in the left column.
- Check the boxes next to "Encrypt messages by default" and "Sign encrypted messages."
- Uncheck the box next to "Use PGP/MIME by default."
- Click the "Enigmail Preferences" button.
Figure: OpenPGP Options
2. Enforce manual encryption.
In the "Sending" tab of the "Enigmail Preferences" window, click the circle next to "Manual encryption settings." Then click the circle next to "Always" under "Confirm before sending" and click the "OK" button.
Figure: Set Manual Encryption Settings
After returning to the "OpenPGP Options" window, click the "OK" button.
Figure: Settings Confirmation
Enigmail Key Management
Search for and Import GPG Keys
1. Navigate to the key management section of Enigmail.
In the menu bar,
Click on Enigmail →
Figure: Enigmail Key Management
2. Search for keys with a keyserver.
In the Key Management window that opens, your key is in bold. Click on
Search for Keys
Figure: Key Search
The next window that appears enables a search for GPG keys hosted on public GPG key servers. It is possible to search for GPG keys by email address, a short key ID or an individual's public GPG fingerprint.
This step starts a search for the key belong to firstname.lastname@example.org based on its public GPG fingerprint. Paste.
In the field next to "Search for key" and click the "OK" button.
Figure: Fingerprint Key Search
Always search with the long fingerprint of a GPG key in the key manager -- short or even long key IDs can be forged. . The results are more secure and work more often. Everyone who shares a public GPG key should share a long fingerprint.
3. Import the desired key(s).
In the next window that appears, an entry for "email@example.com" with a Key ID starting
with "81934E7B" should be displayed with a check mark next to it. Click the "OK" button to import the key.
Figure: Key Importation
A window should appear stating that the key for "firstname.lastname@example.org" was successfully imported.
When importing the key, it is not a problem that the email address is different from the "email@example.com" one listed above. Multiple email addresses can be used with a GPG public key.
"Anonguide@vfemail.net" is simply an older email address associated with the key. The important aspect to note is the fingerprint, which should appear as:
8193 4E7B 83E8 9CFD 8C25
F3D6 7FBD 0408 86EC 5FE0
Click the "OK" button to continue.
If the fingerprint is different than what is shown above, delete the key for the "anonguide" email address in the key manager and start over from the beginning of this section.
Figure: Key Importation Confirmation
Important: It is critical to verify any GPG public key that is added to the keyring with a fingerprint provided by the person you intend to communicate with.
Always remember that anyone can add a GPG public key to a key server and claim to belong to a certain email account. Consider the following attack vector:
- An attacker is monitoring an email account through surveillance.
- An encryption key is mistakenly used that was created to falsely correspond to the intended recipient of communications.
- The attacker is now able to read the user's email.
Add User ID to Key Properties
In this section an additional account is added to your GPG key. This is necessary due to the fact that the "danwin1210.me" email service also allows emails to be sent to and from its .onion domain, which is a good feature. Therefore, these steps add your email address with the .onion domain to the same GPG key. This makes it easier for software used by others to automatically select your GPG public key when sending an email to one of your addresses.
1. Open the "Key Properties" window.
Double-click on the key entry for the danwin1210.me email address to open the "Key Properties" window.
Figure: Select your Key
2. Select the "Manage User IDs" option.
When the "Key Properties" window opens, click on the pull down menu entitled "Select action" and then click on "Manage User IDs."
Figure: User ID Management
3. Add a User ID.
In the next window that appears, click the "Add" button.
Figure: Add User ID
4. Complete the User ID fields.
- In the field next to "Name," use the same name you chose when setting up the email account.
- Next to the "email" field, add the username you chose followed by "@tt3j2x4k5ycaa5zt.onion"
- In the example below, replace "youranonemail" with your user name.
- Type firstname.lastname@example.org in the field next to "Email." Then, click the "OK" button.
Figure: User ID Fields
5. Enter the GPG passphrase.
A prompt will appear to enter the GPG passphrase. Either copy and paste the GPG passphrase from
KeePassXC, or manually enter it then click the "OK" button.
Figure: GPG Passphrase Prompt
The next window should inform that the User ID was added successfully. Click the "Close"
Figure: GPG Passphrase Success
6. Change the Primary User ID.
After returning to the "Change Primary User ID" window, click on the entry with the
"danwin1210.me" domain. Then, click the "Set primary" button.
Figure: Primary User ID Setting
The next window should inform that the Primary User ID was changed successfully. Click the "Close"
Figure: Primary User ID Successful Change
7. Finalize the procedure.
After returning to the "Change Primary User ID" window, click the "Close Window" button.
Figure: Procedure Finalization
Import Public Keys from Websites
On occasion, the GPG public key of an intended email recipient is not located on a key server, but a public key block is hosted on a website.
To import these keys into Thunderbird:
- Copy the public key from the website to the clipboard.
- Navigate to the Enigmail key management program:
- Import the keys:
Import Keys from Clipboard
Alternative Key Server Methods
There are two alternatives for interacting with key servers:
- KGpg: To fetch contacts' GPG keys from the key server, open KGpg and navigate to Key Server Dialog. Search for relevant email addresses and import the keys.
- GPG command line: Searching, fetching and importing keys from key servers from the command line [archive] is relatively simple.
Note: Previously, Enigmail's keyserver interaction features did not work out of the box.   With these instructions, it should no longer be necessary to apply manual settings following a restart of Thunderbird in order to interact with key servers.    
Export the Public Key to a GPG Server
1. Copy the GPG key fingerprint.
This is necessary to check the key is successfully exported at a later step and to set up a GPG key signature block. Use the mouse to highlight the text next to "Fingerprint." Then, right-click the highlighted text and click "copy."
Figure: GPG Key Fingerprint
After copying the GPG fingerprint, click the "Close" button.
Figure: Key Properties Window Closure
2. Select the key to be uploaded.
Right-click on the entry for the email address and click "Upload Public Keys to Keyserver."
Figure: Upload Public Keys
A progress meter will then appear. If the upload is successful, no confirmation message will be received.
Figure: Upload Progress Meter
3. Confirm the key was successfully uploaded.
To check that the GPG public key was successfully exported to the keyserver, do a search for your own key the same way you searched for the key belonging to "email@example.com" in an earlier step.
Simply paste the public GPG fingerprint into the search field and remove the spaces between the letters and numbers.
4. Close the Enigmail Key Management window.
Click the "X" in the upper right corner of the window.
Public GPG Key Signature Block
The following steps configure Thunderbird to inform people about the public GPG key by embedding it in the email signature.
1. Navigate to account settings.
After returning to the main Thunderbird window, click on
Figure: Further Account Settings
2. Create an email PGP signature block.
A signature is now created that will be included in all outgoing mail, which contains both the GPG public key ID and the GPG public key fingerprint. In the next window that appears:
- Click in the text field located underneath "Signature text."
- Paste the contents of the clipboard on to two separate lines in the text field.
- On the first line:
- Type "GPG Public Key:" before the fingerprint that was just pasted.
- Delete all but the last 16 characters of the fingerprint from this line. 
- Type "0x" (that is the numeral zero) directly in front of the remaining characters. 
- On the second line, type "Fingerprint:" in front of the characters pasted there. This will help enable people who download the GPG public key to verify that it is they key you wish them to use. When finished, click the "OK" button.
Figure: PGP Email Signature Block
Compose and Send Encrypted Email
The first section will test the correct sending of the first encrypted email to firstname.lastname@example.org with Enigmail.
The second section outlines using KGpg instead of Enigmail. This is for users who require a higher level of security for importing private keys and creating ciphertext which can be sent via Thunderbird.    
1. Compose a new email message.
Click the "Write" button located in the upper left region of the window.
Figure: Compose a New Email
A new window will open for you to compose an email message.
Since the "danwin1210.me" email service is hosted on the .onion Tor server "tt3j2x4k5ycaa5zt.onion," you are going to send an email to the .onion domain. This keeps the transit of the email inside the Tor network, which is safer than transporting it in the clear. If an email provider of someone you want to send an email to uses a .onion domain, always use that domain in the "To" field if possible.
In the "To" field, type.
In the "Subject" field, type.
Next, type an innocuous message into the message body. Do not go into great detail; a large amount of text is unnecessary.
The point of this email is to test the encryption key and to become familiar with a common encrypted email exchange. Take note of the padlock and pencil icons located towards the upper-left side of the window next to the "Spelling" button. These icons should be marked as active with a green check mark, a gray square around them with the padlock closed, which means your message will be signed and encrypted (if you have a corresponding public key). To the far right of these icons, a status message also informs that the message will be signed and encrypted.
In this configuration, the subject field is never encrypted, even when the message and attachments are encrypted. Therefore, be wary of any information entered into in the subject field.
2. Send the email message.
When the message is ready, click the "Send" button.
Figure: Send an Encrypted Email
You may next be prompted to enter the GPG passphrase (if this window does not appear, skip to the next step). This makes it possible for the message sent to be signed. When a message is signed, this provides a mechanism for the email recipient to be confident that the sender actually wrote the email, and not an impostor. Type the passphrase and click the "OK" button.
Figure: GPG Passphrase Prompt
After typing in the passphrase, a confirmation window will appear asking if a signed and encrypted email should be sent to email@example.com. Take note of the body of the email message under that window. This text should be clearly visible:
-----BEGIN PGP MESSAGE-----
Followed by a series of random characters. This proves the email has been encrypted and it is safe to click the "Send Message" button. However, if the original text of the message is visible, then it is not encrypted and the "Cancel" button should be clicked.
Figure: Email Encryption Confirmation
3. Enter the password for your email account.
A prompt will appear to enter the password for the danwin1210.me account. This will happen each time Thunderbird is started and the first email is sent, since the password is not stored by the program. However, once the password is entered, Thunderbird will remember it for the session. The same process applies to receiving email.
When asked to enter the password, copy it from KeePassXC (or refer to your physical record), paste it into the password field and click the "OK" button.
Figure: Passphrase Prompt
Do not use Thunderbird's Password Manager to store the password! Thunderbird does not encrypt stored passwords by default. Thus, if an attacker compromises the machine and manages to access the Thunderbird folder, they will gain the password to the email account.
After returning to the main Thunderbird window, a new "Sent" folder should appear in the Local Folders on the left side of the window, indicating the email to firstname.lastname@example.org was sent.
Figure: Thunderbird Sent Folder
- Open KGpg and select the recipient key. If selecting more than one key, press
CTRL while clicking.
- Navigate to:
Open Editor and write the message.
- Encrypt the message to ciphertext by clicking on the Encrypt lock icon. Choose your private key in the prompt that appears and click
- Copy the ciphertext into Thunderbird and send it as per normal procedures. Do not include subject lines since they are not encrypted.
Download and Read Encrypted Email
In the near future, you will want to check if anyone has sent email messages or if a response was received to the test email composed in the previous section.
1. Check for new email messages.
From the main Thunderbird window, click the "Get Messages" icon to check for any new email messages on the server and download them.
Figure: New Email Check
2. Enter the password.
A prompt will appear to enter the password for the email account. After entering the password, Thunderbird will remember it for the session. When asked to enter the password, type it into the password field (or copy and paste it from KeePassXC) and click the "OK" button.
Figure: Passphrase Prompt
3. Read new (encrypted) email messages.
When new emails are received, a counter will appear next to "Inbox" in the left column. Click on "Inbox" to go to the list of new emails, then click the email that you wish to read.
Figure: Thunderbird Inbox
If the message received was encrypted with your public key, the GPG passphrase is needed to decrypt it. If a window like the one in the image below appears, type the GPG passphrase and click the "OK" button.
Figure: GPG Passphrase Prompt
The email will now display in the lower portion of the Thunderbird window. From here, you have the option of replying, forwarding, deleting and so on. If a message is read that was sent from email@example.com with an Enigmail message stating "Good signature from
AnonGuide <firstname.lastname@example.org>," the encryption configuration is working correctly.
Figure: Successful Email Decryption
If all steps have been successfully completed then you now have an anonymous email account paired with strong encryption.
It should be emphasized this wiki entry is not a substitute for an all-inclusive tutorial on the safest way to use GPG/PGP encryption, however it provides a solid foundation for fundamental practices. Numerous advanced resources and expert opinions exist on the Internet, and these can provide additional tips that might better address a user's perceived threat model and circumstances.  At a minimum, it is recommended to review the Safe Email Principles section, along with additional learning resources.
Finally, always heed the following warnings regarding email:
- Email is a very insecure means of communication where anonymity is concerned. A lot of metadata is leaked with email, so it should be used sparingly and only when strictly necessary.
- Do not contact people you know in real life at non-anonymous email addresses with the email account that was created here. Always separate real world identities from online identities used with Whonix ™.
- Be circumspect about sharing personal information in email! Encrypted email does not protect against the email recipient storing personal emails in an unencrypted format. Nor does encryption protect against an email recipient maliciously using personal information in order to exploit you.
- Never include sensitive information in an email subject line, even if the email is encrypted! Subject headers in email are not encrypted in this configuration, despite the fact the rest of the message is.
- If an email is sent to a recipient without encryption, assume it can be read by anyone!
- Utilize the Tor Onion Service (.onion domain) whenever it is made available by the email provider. After first confirming the domain is controlled by the email provider, it will afford greater protection than a clearnet address.
Interested readers can refer to the following additional resources on GPG, Enigmail, KGpg, and safe email practices:
This wiki entry is based on chapter 4.6 of A Beginner Friendly Comprehensive Guide to Installing and Using a Safer Anonymous Operating System, which can be found here [archive]. This material has been used with the author's permission. 
- ↑ 1.0 1.1 http://forums.whonix.org/t/tor-project-support-of-whonix/5030 [archive]
- ↑ https://trac.torproject.org/projects/tor/wiki/torbirdy [archive]
- ↑ https://blog.torproject.org/our-latest-release-torbirdy-thunderbird-includes-new-enigmail-features [archive]
- ↑ https://trac.torproject.org/projects/tor/ticket/21880 [archive]
- ↑ Similarly, that same information should not be stored on electronic media in the first place, if that is feasible in the circumstances.
- ↑ Installed by default in Whonix ™ 15.
torproject.org Gnu Privacy Guard / GnuPG [archive]
Content on this site is Copyright The Tor Project, Inc.. Reproduction of content is permitted under a Creative Commons Attribution 3.0 United States License [archive]. All use under such license must be accompanied by a clear and prominent attribution that identifies The Tor Project, Inc. as the owner and originator of such content. The Tor Project Inc. reserves the right to change licenses and permissions at any time in its sole discretion.
- ↑ This is because packages are often unsigned, and users may forget to update the software in a timely fashion.
- ↑ Or create random Diceware passphrases of sufficient length.
- ↑ Depending on the service provider in use, they may or may not enable TLS/STARTTLS connection security for their Onion domain. The reason is because it is redundant, as end-to-end Tor encryption provides security properties for authenticating to the server.
- ↑ This is optional because some users may not place trust in the integrity of KeePassXC or other password managers, and they remain an attractive target for hackers.
- ↑ This will be useful in case the passphrase is ever forgotten.
- ↑ Due to the threat of collisions, see: https://superuser.com/questions/769452/what-is-a-openpgp-gnupg-key-id [archive]
As it has been made fail closed by TorBirdy developers [archive], otherwise there could be a DNS leak in setups not using Whonix ™.
- ↑ A previous proposal on how to make keyservers in Enigmail in Whonix ™ work out of the box: do not use keyserver-options in Whonix ™ [archive]
- ↑ Upstream bug report: Can't set custom http-proxy on GnuPG-settings, lost after restart [archive].
- ↑ There is no need for this setting in Whonix ™ since Enigmail calls GPG, everything is already torified, and gpg is stream isolated by a uwt wrapper.
- ↑ Forum discussion: https://forums.whonix.org/t/gpg-keyservers-from-within-whonix-workstation [archive]
- ↑ Previous instructions:
Enigmail (from menu bar) →
Display Expert Settings and Menus →
Additional Parameters → remove the following part
--keyserver-options http-proxy=http://127.0.0.1:8118 [archive] →
- ↑ In the example below, the fingerprint consists of 10 groups of 4 characters. Delete the first six groups, then delete the spaces in between the remaining groups of characters.
- ↑ In the example below, that results in
0x1C593D788F0E5176. The end result of what is created here is the GPG public key ID. People can enter that into various GPG key servers to find the public key and send you encrypted messages.
- ↑ Avoiding Enigmail bypasses any unexpected behavior with message encryption. For instance, in one case bugs in email clients and Enigmail lead to the auto-saving of drafts as plaintext.
- ↑ https://tails.boum.org/security/claws_mail_leaks_plaintext_to_imap/index.en.html [archive]
- ↑ http://sourceforge.net/p/enigmail/bugs/502 [archive]
- ↑ Persons in critical situations may prefer to encrypt emails in such a way to mitigate the risk of leaks.
- ↑ For instance, users at high risk might generate a strong airgapped OpenPGP key pair on the command line for greater security, rather than rely on Enigmail.
- ↑ KGpg Homepage [archive], KGpg wiki with screenshot [archive]
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat and Policy On Nonfreedom Software applies.
Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)
Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].
Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.