Security That Proves Our Privacy Promise Zero Knowledge. Zero Trust.

Many companies *promise* privacy. Our zero-knowledge architecture is designed to *guarantee* it. We've built a system where it's technically impossible for us to read your emails, ever.

Why We're Different

Your privacy is our priority, not our product

End-to-End Encryption

We can't read your emails

You Control Keys

Generate & manage encryption

Hong Kong Based

Outside Five Eyes jurisdiction

No Data Mining

We don't sell your data

The Pillars of Our Email Security

Our entire security model is built on three core principles that ensure your data remains yours.

Zero-Knowledge Architecture

When you create an account, your encryption keys are generated on your device. The private key, which is required to decrypt your emails, is never sent to our servers. This means we have zero access to your private conversations.

End-to-End Encrypted Email

Every email you send and receive is encrypted with your public key before it's ever written to our disks. This end-to-end encrypted email ensures that even if our servers were breached, your data would remain unreadable.

Hong Kong Jurisdiction

Our servers and our company are based in Hong Kong, a country with strong data privacy laws. We are outside the reach of the Five, Nine, and Fourteen Eyes surveillance alliances, providing a legal shield for your data.

Advanced Encryption Standards

We use the most secure and efficient encryption algorithms available

TLS 1.3

Latest Transport Layer Security for secure connections.

  • Zero Round Trip Time (0-RTT)
  • Modern cipher suites
  • Protection against downgrade attacks

Curve25519

Gold standard in encryption for key exchange.

  • Industry-standard encryption curve
  • 128-bit security with 256-bit key size
  • Resistant to timing attacks

Ed25519

Superior digital signatures for authentication.

  • Smaller key sizes with better security
  • Faster key generation and signing
  • Resistant to side-channel attacks

Hong Kong Jurisdiction

Located outside Five Eyes jurisdiction with strong privacy protections

Strong Privacy Laws

Hong Kong provides robust legal protection for your data.

  • No laws requiring backdoor access
  • Strict data protection regulations
  • Outside Five Eyes surveillance

Complete Data Control

Full control over your data with no external interference.

  • Full control over encryption keys
  • No data mining or analysis
  • Automatic log clearing every 7 days

DNS Security Beyond Email

Protect your entire domain infrastructure with Hong Kong-based DNS servers

DNSSEC Protection

All DNS records are cryptographically signed to prevent attacks.

  • Prevents DNS spoofing
  • Blocks cache poisoning
  • Cryptographic verification

Hong Kong DNS

DNS infrastructure hosted in Hong Kong for privacy protection.

  • Outside foreign surveillance
  • Protected from jurisdiction
  • Local privacy laws apply

Full Control

Complete control over your DNS infrastructure and settings.

  • Customizable settings
  • Complete configuration control
  • Real-time management

Attack Prevention

Advanced protection against DNS-based attacks and hijacking.

  • DNS hijacking protection
  • Advanced threat detection
  • Continuous monitoring

How We Compare

See why PDG Mail offers superior security compared to other providers

Feature PDG Mail Other Providers
Key Control
Customer controlled
Provider controlled
Data Access
Zero-knowledge
Provider can access
Encryption Standard
TLS 1.3 + Curve25519
TLS 1.2 + RSA
Data Mining
Impossible
Common practice
Jurisdiction
Hong Kong
Five Eyes

Ready to secure your communications?

Join thousands of privacy-conscious users who trust PDG Mail with their sensitive communications.