Good afternoon, gentlemen. New email address for any communications to me:
This email address is also in my contact form on this website. I still have the old email if gentlemen forget but I prefer the use of the Protonmail email for security of information. Those of you that rather verify or screen via my protonmail because of feeling more comfortable with that versus completing the screening form is perfectly fine as I always seek to be on the cutting edge of making my prospective clients feel better about visiting this wild tigress.
Please review the Protonmail website for more details: https://protonmail.com/
Hugs and kisses,
Security Information from Protonmail website:
Messages are encrypted at all times
Messages are stored on ProtonMail servers in encrypted format. They are also transmitted in encrypted format between our servers and user devices. Messages between ProtonMail users are also transmitted in encrypted form within our secure server network. Because data is encrypted at all steps, the risk of message interception is largely eliminated.
Zero Access to User Data
Your encrypted data is not accessible to us
ProtonMail's zero access architecture means that your data is encrypted in a way that makes it inaccessible to us. Data is encrypted on the client side using an encryption key that we do not have access to. This means we don't have the technical ability to decrypt your messages, and as a result, we are unable to hand your data over to third parties. With ProtonMail, privacy isn't just a promise, it is mathematically ensured. For this reason, we are also unable to do data recovery. If you forget your password, we cannot recover your data.
Open Source Cryptography
Time-tested and trusted encryption algorithms
We use only secure implementations of AES, RSA, along with OpenPGP. Furthermore, all of the cryptographic libraries we use are open source. By using open source libraries, we can guarantee that the encryption algorithms we are using do not have clandestinely built in back doors. ProtonMail's open source software has been thoroughly vetted by security experts from around the world to ensure the highest levels of protection.