Skip to content

FAQ Encryption & Security

danorton edited this page Sep 19, 2014 · 13 revisions

Is Mailpile an encrypted email service?

Mailpile is not an email service, it is an email client. But Mailpile does support strong encryption.

What is your PGP public key?

Our team PGP key is downloadble from here: https://www.mailpile.is/files/[email protected]

Can you please include insert-some-random-encrypted-service.

Yeah, we'll get right to that - after we get the widely adopted protocols supported robustly ;)

I was looking for a private email server that can hide my email address from everyone that I haven't mailed to, does your service provide this?

Nope. That's actually impossible. If anybody tells you they can do this, they are probably lying. Sorry!

Is it possible to delete a message that you send to someone, but you don't want them to keep in their account after certain period? (If not it should be developed).

No, that isn't possible. You can't un-tell somebody something. You can ask them nicely to delete the mail, but if they decide not to, you can't make them. Sorry. Nobody is going to be able to develop that feature in a way that is guaranteed to work, ever. This isn't a James Bond movie.

Can you create a pseudonym email address that only the recipient can see to identify us and send us message to, but it does not reveal my actual email address?

That's not really a part of the intended use of Mailpile. Somebody might provide this kind of service though - it sounds useful!

How will you prevent governments from accessing your user database?

Simple: We will not have a user database. We do not have any server infrastructure that contains user information. Users install the Mailpile client on their own computers. We do not track people that want to use Mailpile.

How safe is it to store email metadata in RAM (Random-access memory)?

It's pretty safe. If your computer is compromised, the storage is probably compromised anyway and you will have bigger things to worry about than your email account.

Will it, by default, deploy using encrypted configuration data?

Yes. Currently this is a configuration option which is turned off by default, but before our first stable release we will switch to having configuration data encrypted by default.

Would it possible to add support for one-time passwords?

This sounds reasonable. There are a lot of two-factor authentication methods we may consider implementing.

How secure is the database? Is it stored on an encrypted volume?

Yes. All configuration data, including the search index, will be encrypted by default when we get to the full release.

How are attachments stored? Are they encrypted, as well?

They are stored wherever your email is stored. If that's secure, the attachments are secure. We will provide methods to secure your email, although we recommend you should be using a full disk encryption!

Will search work with encrypted files? Or, are they residing on some encrypted file system, and seem un-encrypted to it?

Mailpile decrypts incoming emails, indexes them, and re-encrypts them. The search index is stored encrypted, and the terms are stored as hashes. Good enough?

Does Mailpile have no weak points when it comes to privacy/security? How can they be closed?

Yes. Email metadata is hard to secure, because the standards don't really allow for keeping it all secret. We can't do much about that. Also, if the recipient of your email doesn't have a publicly available encryption key, you can't send them encrypted email. Sorry, that's the way public key cryptography works.

The decrypted message is vulnerable/visible on compromised system? Can it be obfuscated?

If your system is compromised, you have a very big problem that Mailpile can't really help you solve. We will try to do what we can, but endpoint security is very important.

Will Mailpile work with .onion (Tor) domains?

We plan to provide support for that.

Will it work when residing on an in-Tor server?

Yes!

Will Mailpile support address aliases for incoming mail? ([email protected] = [email protected])

That's really up to the mail server to decide. Mailpile is a mail client, not a mail server. Sorry!

Isn't email forwarding a possible breach of security?

Yes, it is. It's also unavoidable. We can't prevent people from forwarding information - even if we were to do all sorts of magic to make it impossible in Mailpile, somebody could still write down your email on a postcard and send it to a friend. This is called the analog gap. The only solution is, don't send secrets in email to people you don't trust.

How will this service compare with something like Hushmail which claims to offer message en/decryption in browser as well as IMAP (if one pays).

Hushmail stores your email data on their servers. Mailpile does not have servers and we do not store users email. One can use Mailpile for free to send & receiving encrypted email through any IMAP servers.

Is MailPile a viable non-centralized solution to issues like those faced by other privacy focused email companies like Lavabit or Silent Circle?

Yes, this is one of our core beliefs and underlying design principles.

What happens when you are communicating with people who are still hosted by Google or a self hosted insecure server? Do they need to implement something too?

People can continue using gmail or their acamdemic institutions email "server" as Mailpile is just the "client" that allows for sending of encrypted messages.

Does everyone need to be on your system (and using Mailpile) to be truly secure?

In order to send encrypted email all recipients need to have public & private PGP keys and be encrypting their messages. Many other email clients allow people to send PGP encrypted emails. Hopefully, Mailpile is the easiest to use ;)

You don't mention anything about secure public key distribution. Is this a problem you plan to tackle?

We plan to attach users public keys with outgoing emails. Additionally, since some instances of Mailpile will be accessible over the web, that makes for interesting new opportunities for sharing of keys.

If I write an email from my Mailpile to a friend's gmail, how does the encryption prevent his inbox from scanning the contents of my email?

As long as both people use encryption, even if one or both people have @gmail.com addresses, Gmail cannot read encrypted email data even if the data ends up being stored on Gmail's servers.

Will you be storing my private key on your mail server?

No. We do not have servers and we do not store users private keys. You install our software on your computer which keeps your key nice, safe, and under your control.

Will Mailpile function similar to Lavabit and use different passwords for IMAP connections that are not related with private key password used to to decrypt mails?

No. Mailpile is entirely different than Lavabit.

Do you have plans to implement RFC6698 DANE, and move towards CA free authentication?

We are uncertain about this at the moment.

Do the mails stay encrypted in your servers or are they stored in plain text?

We don't have servers, so no. We do not store your emails. Messages are stored on your computer and encrypted with Open PGP. This does not include headers and metadata. However, Mailpile will encrypt metadata on your disc using AES-256-CBC at the moment, with a plan to move to AES-256-GCM in the future for tagging purposes. The keys for the AES are stored in the configuration file, which is PGP encrypted.

If e-mails are encrypted, how do you intend to implement a searching function?

Mailpile decrypts incoming e-mails, index them, and re-encrypts them. The search index is stored and also encrypted as well as the terms which are stored as hashes. Good enough?

So what exactly will be encrypted and what about the metadata?

The e-mail body will be encrypted. We are trying to find ways to make most of the metadata encrypted as well, but some of it can't be because of how e-mail works.

Is Mailpile going to send PGP encrypted e-mail, where the mail body is encrypted, but all the headers and the metadata are not?

Yes. We are experimenting with ways to encrypt headers as well using standard PGP + SMTP protocols.

Or are you planning to somehow also encrypt the metadata (like in Bitmessage)? Would that even be possible with e-mail?

We're going to try and encrypt all the metadata using PGP + SMTP, but e-mail still requires that some of the metadata be un-encrypted so that mail servers will know where to deliver it to. We plan on integrating Bitmessage before 1.0

Will you use the Perfect Forward Secrecy in your mail ?

We can't actually guarantee that without breaking a vital part of e-mail's functionality: people want to be able to read their old e-mails. If we implemented PFS, then nobody could ever view their archives. We consider this an antifeature, so we won't even try. Instead, we're going to just try to protect your e-mail as well as we can while it is in transit (using PGP and opportunistic SSL), and as well as we can when it is at rest (using PGP, mostly).

Will you implement start TLS in your e-mail system?

Of course. Although we do urge all e-mail providers to provide TLS natively, because, while opportunistic encryption is better than no encryption, it's way better to support always-on encryption.

Will you hide the IP when send an e-mail with your service?

We aren't providing a sending service. Our e-mail client can't obfuscate IP addresses - but if you route your mail through Tor or a Mixmaster, it might improve things for you.

How does Mailpile know what key to use for a recipient?

When you add or edit a contact, select the “Find Encryption Keys” button. Mailpile will then search a public key server for a matching key and add the key to the contact. In the beta version, Mailpile selects the first matching key at server hkp://subset.pool.sks-keyservers.net.

How can I add a key to the keyserver?

If the recipient’s key is not already on the server(s) searched by Mailpile, you (or anyone else) can submit a public key directly to the server at http://subset.pool.sks-keyservers.net/.

Does Mailpile support sending SMIME e-mails?

No. We are working on pgp/mime first, getting the metaphors and the UI right before we add alternate encryption schemes. S/MIME is also generally based on PKI which the general consumer may not have easy access to. We expect it'll be supported in the future.

I send a lot of email, when it arrives on there servers is it decrypted or does decryption take place on the computer of the person who is supposed to receive it?

You do not have any control over how the recipients of your mail is going to PGP decrypt the encrypted emails they receive from you, since the setup of emails can vary a lot.

Clone this wiki locally