We added an AONT to strengthen our encryption without changing the key length. What is AONT? Learn more inside...
Certificate generation: behind the scenes.
To generate a certificate we require some amount of random data. There are plenty of sources from where we can get data, but the vast majority of them are not random and cannot be used for our certificate. Moreover, none of these sources are truly random. That's a real problem faced by any cryptography service...
SenseMail's paswords - what we have to make you use strong passwords.
SenseMail's threat model - what threats we protect you from and how we do it.
The importance of encryption is paramount in today’s world of ever increasing threats. The issue is that people concerned with privacy might have sinister motives as well. It is not a secret that encryption can be used for evil. Terrorists, kidnappers, blackmailers, drug dealers, etc. can use it to get away with their businesses. The solution? All the encryption must be weakened, back doored or even completely banned. Right? Let us take a look at the aftermath of weakened encryption in the real world scenario.
When talking about email security, the most important thing that comes to the mind of most people is usually the “https” text in the address bar. According to security experts, that is just a part of the way email security works, and there are numerous other things that have to be integrated into an email client to make it highly secure.
There are a few elements of email that can be controlled by the user, so as to make sure that they have done the best they could, from their end. A major element of that security is the first thing that came to your mind when thinking of security: the password. A good password use can mean the difference between a malicious access to the account, and an account which takes years to crack.
Hackers, the legendary creatures... But your business competitors are real. And much more evil...
What are the main threats to your e-mail? Email security is a raging issue at the moment, and a lot of companies are grappling with the onslaught of notorious hackers who are usually interested in gaining information about the target. With all this cross-compatibility and popularity that email has gained, gaping loopholes have been opened that pose significant risk to your business information, or even worse, your private information.