Teams | Collaboration | Customer Service | Project Management

The Vital Role of Encryption and Privacy | Short Clip from Wire Uncut

Wire Uncut is a bi-weekly video series by Wire spotlighting bold, secure, European-built alternatives to Big Tech. In each 10–15 minute episode, we sit down with founders, product leaders, and technologists from across Europe to talk candidly about digital sovereignty, trust, security, and innovation in enterprise tech. In this clip from Wire Uncut, we talk with Hanna Bozakov (Tuta) about how Tuta got started, and why end-to-end encryption has been part of their DNA from day one. She also shares a clear stance on encryption backdoors, and why weakening privacy is never the answer.

What sets Tuta apart from Big Tech? | Short Clip from Wire Uncut

Wire Uncut is a bi-weekly video series by Wire spotlighting bold, secure, European-built alternatives to Big Tech. In each 10–15 minute episode, we sit down with founders, product leaders, and technologists from across Europe to talk candidly about digital sovereignty, trust, security, and innovation in enterprise tech. What sets Tuta apart from Big Tech? In this short clip from Wire Uncut, Hanna from Tuta explains how their privacy-first mindset, user-driven model, and commitment to encryption make them fundamentally different from mainstream platforms.

Wire Uncut Ep. 2 | Tuta | Reinventing Email for Privacy-First Organizations

Wire Uncut is a bi-weekly video series by Wire spotlighting bold, secure, European-built alternatives to Big Tech. In each 10–15 minute episode, we sit down with founders, product leaders, and technologists from across Europe to talk candidly about digital sovereignty, trust, security, and innovation in enterprise tech. We dive into Tuta’s journey; from their origins and evolution to the values that drive them today. You'll hear how they build with their users at the center ("Our stakeholders are our customers"), what matters most to privacy-conscious organizations, and how they respond to rising threats like chat control. We also unpack what digital sovereignty means to Tuta and why it’s more than just a technical feature.

Why Crisis Communication Needs End-to-End Encryption

Last year, the world experienced 3205 cyberattacks and data breaches, and the biggest attack exposed more than 3 billion user accounts. As organizations step up their cybersecurity efforts, they must also ensure compliance with emerging regulations. Newly implemented laws like the NIS2 (Network and Information Systems Directive) are now focusing not just on external or customer facing protocols and incident management, but also secure internal communication processes and records.

Secure communications deserve clarity, not confusion

The rise of secure communications is a crucial aspect of adapting to a threat-filled digital landscape, enabling individuals and organizations to communicate safely, privately, and with sovereignty. It is in this spirit that Wire has raised concerns about what we consider to be risky, insecure, outdated, or non-credible approaches. Recently, we raised such concerns about Matrix, which seem to have struck a nerve and led to a lengthy and heated response.

Wire and EBCONT Partner to Deliver Secure, Compliant Communication for Europe's Public Sector and Infrastructure

In today's world, secure communication is essential rather than optional. That’s especially true for public institutions and critical infrastructure providers navigating increasing cyber threats and growing regulatory pressure. That’s why we’ve partnered with EBCONT, one of Austria’s leading IT service providers, to deliver end-to-end secure communication that’s compliant, sovereign and built for Europe.

Big Tech is Making Data Sovereignty Promises it Can't Keep

Microsoft CEO Satya Nadella is putting the best foot forward possible in an impossible situation. Microsoft is investing significant effort and resources into “private” and “sovereign” service offerings and curation to reassure EU customers that their data will be secure. In a recent LinkedIn post, Satya announced new sovereign offerings that he says reflect Microsoft’s commitment to giving customers choice, control, and security.

The Ultimate Guide to European Alternatives to Big Tech Tools

Tired of relying on Big Tech for your collaboration, communication and productivity needs? You’re not alone. Whether you’re concerned about data privacy, compliance, vendor lock-in, or digital sovereignty, the shift to European-built software is gaining serious momentum. And for good reason: these platforms respect your data, operate under GDPR by default, and are often open source or self-hosted.

Meta's stealth tracking: another EU wakeup call

Every time a user visited a website with a Meta Pixel, the app silently collected browsing metadata, cookies, search activity, products viewed or purchased, and tied it to the user’s identity via app login IDs or Android Advertising IDs. This invasive behavior bypassed browser privacy settings, undermining user consent.