Explanation on recent DDoS attacks why we do not use third-parties for mitigation

The Tutanota Blog