Popular, intuitive and feature rich as it is, Gmail is not without its flaws. Privacy concerns have, time and again, reared its head when it comes to most of Google’s web-based services, and Gmail, unfortunately, is no exception to that rule. The company has often had to face criticism for its alleged snooping on users’ emails to search for keywords that are then used for targeted – or as Google calls it, “contextual” – advertising. So, for those who feel uncomfortable using Gmail (or any of the other mainstream email services for that matter) because of privacy concerns, we have compiled a list of the very best encrypted email services with end-to-end encryption that you can use without worrying about any unauthorized entity getting their hands on your private conversations.

ProtonMail was founded at the CERN research facility in Switzerland back in 2013, but has only been available to the general public since last year, after having remained invitation-only for the first few years of its existence. It is, by far, the most popular encrypted email service available today, and you can access it either through the website on your browser or via the mobile apps that are available on both Android and iOS. The service supports end-to-end encryption, which means your messages are encrypted from the moment they leave your device to the moment they reach the intended recipient(s). The company claims to use secure implementations of AES, RSA and OpenPGP encryption algorithms, along with open source cryptographic libraries that have been vetted by eminent cryptographers and cyber security experts from around the world, which should greatly reduce the risk of backdoors from either cyber-criminals or government agencies with scant regard for personal privacy.

However, for all its security, ProtonMail does have a few drawbacks that have held it back from becoming more popular than it currently is. First off, it doesn’t offer IMAP or POP3 access, which means you cannot view your ProtonMail messages in popular email clients like Microsoft Outlook and Mozilla Thunderbird. For the very same reason, you won’t be able to set up your ProtonMail client to send emails using any non-Proton email accounts either. While it is intended to be a security feature, the fact that the company doesn’t even offer support for the POP3 and IMAP protocols as an option is something that makes it difficult for many to switch over to ProtonMail for good.

Lavabit is an open source, encrypted email service founded in 2004 by Leder Levison. The service is known to have been used by former CIA employee and NSA contractor-turned-whistleblower, Edward Snowden, who was accused of leaking classified information about U.S. government surveillance programs to the media. The service actually decided to shut down operations in August 2013 after deciding not to comply with a U.S. court order to hand over its SSL (Secure Sockets Layer) private keys to law enforcement agencies investigating the Snowden leaks. However, like a Phoenix from the ashes, Lavabit was resurrected earlier this year with a completely revamped architecture that addresses the issue that led to the service’s demise almost exactly fours ago.

What’s most intriguing, however, is the all-new DIME (Dark Internet Mail Environment) platform that the company promises to use for the redesigned end-to-end encryption of emails. The open source platform, developed largely by convicted hacker Steven Watt, aims to replace existing security protocols, OpenPGP and S/MIME. With DIME, you don’t just encrypt the message, but also get to obfuscate the metadata that includes other potentially-crucial information, like the identities of the sender and the receiver. Until recently, Lavabit 2.0 was only available to its original users who had lost access to their accounts after the service had shut down unceremoniously back in 2013, but the company has now opened up registrations to one and all.

Tutanota is one of the newer entrants into the world of encrypted emails, having entered the industry just a couple of years ago. However, within this short space of time, it has already become a respected name in the world of encrypted email services, and uses 2048-bit RSA keys for its end-to-end encryption and AES-128 protocol for transmission, ensuring the safety of your emails. Right off the bat, the service has a lot of similarity with ProtonMail. Like ProtonMail, Tutanota also offers mobile apps on Android and iOS, and like ProtonMail, you’ll get the option to use a free tier alongside paid services that come with more bells and whistles. However, while ProtonMail offers only 500MB of storage to its free users, Tutanota offers up to 1GB, which is certainly welcome. In case 1GB isn’t enough for you, you can always upgrade to the paid tier that will cost you just 12 Euros per year.

Visit Website (Free, Premium plans start at 12€ per year)

Based on a custom Squirrel email interface, CounterMail is yet another security and privacy-focussed webmail service based out of Sweden. It is one of the oldest and most well-known encrypted email services around, and has been around since the nineties. Like its peers and competitors on this list, it also offers end-to-end encryption using OpenPGP, with SSL-MITM to prevent Man-In-The-Middle attacks. The service actually comes with a number of interesting and unique features that makes it stand out from the crowd. First off, CounterMail stores messages and other data in the memory (RAM) of the company’s live CD-powered servers, and not on any hard disk, so even computer forensics won’t be able to recover the data once lost. For an added layer of protection against keyloggers and brute force attacks, you can also buy yourself a USB dongle with your custom keyfile that needs to be used in conjunction with your password for a two-factor authentication.

Visit Website (Premium plans start at $19 for 3 months)

There are a number of other services that claim to safeguard your mails with end-to-end encryption, but very few offer any real details about their data storage, encryption protocols and policies when faced with demands from law enforcement agencies and court orders to reveal user data. That being the case, it would probably be wise to stick to the tried and tested, rather than experiment with something new that may or may not prove to be the diamond-in-the-rough that you were hoping it would turn out to be.