Security Status: Active

Security That Proves
Our Privacy Promise

Zero Knowledge. Zero Trust. Many companies promise privacy. Our architecture guarantees it. We've built a system where it's technically impossible for us to read your emails.

The Encryption Lifecycle

01

Key Generation

Keys are generated locally on your device. Your private key is encrypted with your password before it ever leaves your browser.

02

Transmission

Incoming emails are encrypted with your public key immediately at the gateway. From that millisecond onwards, they are opaque to us.

03

Storage & Retrieval

Data rests in an encrypted blob. Decryption happens strictly on your CPU when you log in. We never see the raw data.

TLS 1.3

Curve25519

Ed25519

The Pillars of Our Email Security

Zero-Knowledge Architecture

When you create an account, your encryption keys are generated on your device. The private key is never sent to our servers. We have zero access to your private conversations.

End-to-End Encryption

Every email you send and receive is encrypted with your public key before it's ever written to our disks. Even if our servers were breached, your data would remain unreadable.

Hong Kong Jurisdiction

Our servers are in Hong Kong, outside the Five, Nine, and Fourteen Eyes surveillance alliances. This provides a robust legal shield for your data.

Advanced Encryption Standards

TLS 1.3

Transport Security
  • • Zero Round Trip Time (0-RTT)
  • • Modern cipher suites
  • • Protection against downgrade attacks

Curve25519

Key Exchange
  • • Industry-standard encryption curve
  • • 128-bit security level
  • • Resistant to timing attacks

Ed25519

Digital Signatures
  • • Superior authentication speed
  • • Smaller key sizes
  • • Resistant to side-channel attacks

DNS Security
Beyond Email

Protect your entire domain infrastructure. We don't just host email; we provide a secure foundation for your digital presence.

DNSSEC Protection

All DNS records are cryptographically signed. This prevents DNS spoofing and cache poisoning attacks, ensuring your users always reach your real server.

  • > Prevents spoofing
  • > Cryptographic verification

Hong Kong DNS

Your DNS infrastructure is hosted in Hong Kong, protected from foreign surveillance and subject only to local privacy laws.

  • > Local privacy laws apply
  • > Outside foreign surveillance

The Privacy Difference

Jurisdiction

Hong Kong

Protected from Five Eyes surveillance and foreign subpoenas.

USA / EU / Switzerland

Subject to MLATs, CLOUD Act & intelligence sharing.

Encryption Model

True Zero-Knowledge

We technically cannot read your data. Encryption happens on your CPU.

Managed Encryption

Provider holds the keys and can decrypt data for law enforcement.

Key Ownership

You (Client-side)

Keys are generated on your device. You are the sole custodian.

Provider (Server-side)

Keys generated on their server, meaning they have a copy.

Freedom

Open Protocols

Full IMAP/JMAP/SMTP support. Use any app. Migrate anytime.

Walled Garden

Locked to their proprietary app. Difficult to export data.