Powered by Yandex.Translation
Personal site Vyacheslav Gorchilin
Home  |  Notes  |  Calculations  |  E-Shop  |  My Account
Secure Mail
  Send   Receive   What's it?   Sandbox  
Subject:



Code word:

Subject:



Code word:

This is an experimental mail for those who value the security and confidentiality of correspondence, as well as the absence of SPAM.

Even when transmitting information over secret protocols (HTTPS, SSH), there is a possibility of interception and compromise (reading) of data. This is illustrated by the following figure, from which it can be seen that the "weak link" here is the server on which the data is stored in open form. The human factor, back-doors, hacker attacks, etc. can compromise the information stored there. Also, there is evidence that the protocols themselves do not protect the data absolutely.
Our mail is devoid of all these disadvantages. It is based on a symmetric Hash-mask algorithm, in which data encoding and decoding is performed ONLY on the client's platform, and more specifically, in the browser. This guarantees that data interception at any stage: communication channel, server, etc., will not lead to their compromise. The whole secret of reliability lies in the openness and simplicity of the algorithm and scripts, and therefore in full user control of the entire process of maintaining the secrecy of their data.

How do I send an email?
In the "Subject" field, enter some unique name, or the recipient's e-mail. Enter the text of the message, and in the "Code word" field — the characters that you will then pass to the recipient. Click on "Encrypt" and then - "Send".

How do I get a letter?
In the "Subject" field, enter the name of your correspondence, or your e-mail (by agreement with the sender). After clicking on the "Search" button, emails on this topic will be found for you, which are stored on the server. Select one of them, for example, the latest one, enter the "code word" and click the "Decrypt" button. If everything is done correctly, the text of the letter will appear in the window.

Do I need any registration?
Registration is not required, the mail is completely anonymous.

How do I make sure that decryption/encryption of data occurs only in the browser?
You can verify this if you receive a letter, disconnect from the Internet, and only then enter a code word and decrypt the text. Similarly, in reverse order, you can do it when sending a letter. Also, you can practice encrypting texts in the "Sandbox" (off-line) section.

Advanced users can view the scripts themselves; the code in them is completely open. Apply: jQuery, JavaScript-MD5 and our script, which encrypts/decrypts the text and serves the user interface. For clarity, simple and understandable JavaScript and jQuery functions were used.

How do I pass the "code word"?
The code word is the key moment of our whole venture. It must be transmitted to the recipient via an independent communication channel, for example, via an SMS message. If this condition is met, then in no other way, as soon as reading the message with you from the monitor screen, it is impossible to intercept and decrypt it!

How to choose a "code word"?
The code word can consist of numbers and Latin characters. Cyrillic and special characters will theoretically work the same way, but they have not been practically tested everywhere yet. For example, you can use a word known only to you and the recipient, or, if several participants are involved in the correspondence, to all of them. The number of characters of the code word is unlimited.

How to choose the "subject" of the letter?
It is best to use e-mail as the "subject". But it can be any combination of numbers and letters. It is important here that this combination is as unique as possible. The number of theme characters is unlimited.

What happens if the name of my "topic" coincides with someone else's?
Nothing terrible will happen: it's still impossible to decipher the text of the letter itself without knowing the code word.

What is the difference between a "theme" and a "code word"?
The subject is the name of the correspondence on the same issue, or with the same subscriber. In the second case, the e-mail of this subscriber is entered as the subject. In the same topic, the code word can remain constant, or change periodically (by agreement of the parties). The topic can be transmitted to the receiving party via an open communication channel.

The code word must be transmitted via an independent communication channel. The same code word can be used by the user in different topics.

How many people can participate in correspondence on one "topic"?
As many as you want. It is important that they all know the name of the topic and the code word.

What characters can be used in the text of the letter?
The text of the letter can contain numbers, Latin, Cyrillic and special characters.

Is it possible to transfer files?
Not yet. Text only.

How long are mail messages stored on the server?
One month.

In what form are my messages stored on the server?
A real example. In the "Send" section, the following were entered:

  • topic - Test
  • the text of the message is a communication check!
  • the code word is Lighters

As a result, the following file was created on the server fef89e41320e80e4b84822b8df142349_1404124604. From the example, we see that the contents of the file are encrypted, and even its name is a hash, from which it is impossible to understand the name of the "topic".

I want to transmit the encrypted text of the letter through other communication channels. What to do?
In the "Sandbox" section, encrypt the text, and in this form transmit it through other communication channels. Your subscriber can enter this text in the window in the same section and decrypt it. This can be done in off-line mode (without network access).

In which OS or browsers does mail work?
In any OS and in any modern browsers.

How are things with SPAM in your mail?
Here it is fundamentally impossible! There is no point in sending an email that the recipient will not be able to decrypt :)

Here you can practice encrypting/decrypting text.
The text received as a result of encryption can be sent, for example, by ordinary unsecured mail.
By inserting the encrypted text into the lower window, it can be decrypted again.



Code word:

2009-2021 © Vyacheslav Gorchilin