Email Security

Achieve advanced email security with SecrecyMail.

Only ONE access point, your account

Even we cannot locate your messages or derive your password, ever. ONLY those who know your password have access.

Messages are stored in the blockchain

There is no central point that stores your messages, so there is nowhere to steal or even submit a request for your private data.

Built on top of the NxtCoin protocol

Bitcoin allows for the secure transmission of transactions. NxtCoin allows for the secure transmission of email with the same method.

Short and easy to share addresses

SecrecyMail uses easy-to-share personal address that are even shorter than email and far more private than using social media.

What Email Encryption Does

There are a variety of technology tools that can be used to encrypt email. A personal email certificate is one method of protection that digitally signs your messages, reducing the amount of spam messages that can be sent using your name and email account. This digital signature lets recipients know whether the messages they receive were actually sent by you; spoofed email messages will not contain the digital signature, tipping recipients off that the message may contain spam or malicious content.

Email encryption relies on a Public Key Infrastructure or PKI, in most cases, a combination of a private key (known only by you) and a public key (known only to those you choose to distribute it to or even made publicly available). Those sending emails that they want to encrypt would use the public key, while the intended recipient would use the private key to decrypt those messages into a readable format. In the PKI model, anyone can use a public key to encrypt email, but each encrypted message can only be decrypted by a unique private key.

Best practices for email encryption include consistently encrypting all messages you send and receive. Encrypting only email messages containing sensitive information raises a flag to hackers, pointing them directly to the messages that are most likely to contain valuable, sensitive information – the very information you’re trying to prevent outsiders from gaining access to in the first place.

When you encrypt all email messages as a standard practice, hackers wishing to access your personal information have a more substantial task in front of them. Decrypting email messages one-by-one in search of a single message containing sensitive information is a daunting and tedious task that even the most dedicated hackers may feel is not worth the effort.