wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MAILFENCE

profile
Rahul Panchal
Aug 24, 2022
0 Likes
0 Discussions
97 Reads

Mailfence is an encrypted email service that offers OpenPGP based end-to-end encryption and digital signatures. It was launched in November 2013 by ContactOffice Group, which has been operating an online collaboration suite for universities and other organizations since 1999.

 

In the midst of 2013, the Mailfence project was started by the founders of ContactOffice. In March 2016, a beta version of end-to-end encryption and digital signatures for emails was released. In January 2021, Mailfence released progressive web application for mobile devices.

 

Mailfence provides secure email features, with other functions such as Calendar, Contacts, Documents and Collaboration.Encryption and Two-factor authentication are available in the free version of the product. Most other features are only available with paid subscriptions that start at 2,50 € per month.

 

The service supports POP/IMAP and Exchange ActiveSync as well as vanity domains with SPF, DKIM, DMARC and catch-all address support. Users can send both plain and rich text emails, organize messages in folders and/or categorize them with tags, take notes by setting comment on each message and create default message signatures for every sender address. Different identities can also be managed using aliases and filters for incoming emails.

 

The service uses an open-source implementation of OpenPGP (RFC 4880) for emails.OpenPGP keypair is generated in client-browser, encrypted (via AES256) with the user's passphrase, and then stored on Mailfence server.The server never sees the user's OpenPGP keypair passphrase. The service also supports end-to-end encryption for emails using a shared password with the possibility of message expiration.


Comments ()


Sign in

Read Next

Paralysis/Paralysis Stroke

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

What is Spyware?

Blog banner

Memory Management - operating system

Blog banner

Bots and Cyber Security

Blog banner

HR Automation : Need of the hour

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Data Lake

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Linux 94

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Deadlock and starvation

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Making Money through Instagram

Blog banner

Threads in OS

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Kernel in Operating System

Blog banner

Concept and definition of m-commerce

Blog banner

Indian Food

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Process states

Blog banner

IP ADDRESS

Blog banner

Deadlock

Blog banner

UniProcessor Scheduling

Blog banner

Strengthening Active Directory Security

Blog banner

Memory Management

Blog banner

Memory Management

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Data Science & AI

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

THREADS (assignment 1)

Blog banner

ODOO

Blog banner

Mobile Survey

Blog banner

Way to make your meal healthier.

Blog banner

MUTUAL EXCLUSION

Blog banner

Operating Systems Overview

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

objectives and function of operating system

Blog banner

What is OS Fingerprinting?

Blog banner