I'm seeing unread counts on desktop, and I imagine it's coming to mobile very soon. Thanks! This makes my inbox much easier to manage!
Importing contacts if now possible with our brand-new beta client: https://tutanota.com/blog/posts/release-notes-new-client-2-24-1
If you like this update, please consider upgrading to Premium for only 1 Euro/month. Thanks for supporting our fight for privacy and our development team! :)
Now that the catch-all feature is in place, this is less important to me and probably most users that have a personal domain name for email. It would still be helpful for organizations with multiple users.
I think a partnership with Conversations.im to provide secure XMPP services could be very interesting. They're also based in Germany, and they've enhanced XMPP to use the Axolotl protocol (OMEMO). It seems like adding an XMPP offering might not be too difficult at some point, if there's a decent FOSS web XMPP client that could be integrated into the Tutanota client.
Icedove is a rebranded fork of Mozilla Thunderbird that removes Mozilla's trademarks. There's already an open suggestion to create a Thunderbird extension, which would also work with Icedove.
From what I understand, Tutanota uses your passphrase to derive a token used to log in to the service and retrieve encrypted data, and then also uses the passphrase to decrypt a key that is used to decrypt your emails. Tutanota never gets your actual passphrase sent to its server.
In Protonmail, I believe your login passphrase is shared with Protonmail's server, but the decryption passphrase is only used locally to decrypt emails.
We use the browsers print option: Just press CTRL+P to print the currently selected mail. Have you tried that?
Ctrl+P works pretty well in the latest stable version of Chrome. The rendering of emails in webmail / printing is never perfect, but I'd consider this in the ballpark of other email clients and decently usable.
You might want to consider adding a button to the UI at some point, since I don't think ctrl+P is obvious to non-technical users. Of course, this adds clutter and might not need to be a high priority.
Hidden services allow communications to be completely run over the tor network and eliminate the need to pass over the internet from an exit node to tutanota.de. Anyone along the path from the exit node to tutanota.de can see that a connection is being made, and potentially correlate that with traffic entering the Tor network. A hidden service does not allow this (meta)data to leak.