wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MAILFENCE

profile
Rahul Panchal
Aug 24, 2022
0 Likes
0 Discussions
97 Reads

Mailfence is an encrypted email service that offers OpenPGP based end-to-end encryption and digital signatures. It was launched in November 2013 by ContactOffice Group, which has been operating an online collaboration suite for universities and other organizations since 1999.

 

In the midst of 2013, the Mailfence project was started by the founders of ContactOffice. In March 2016, a beta version of end-to-end encryption and digital signatures for emails was released. In January 2021, Mailfence released progressive web application for mobile devices.

 

Mailfence provides secure email features, with other functions such as Calendar, Contacts, Documents and Collaboration.Encryption and Two-factor authentication are available in the free version of the product. Most other features are only available with paid subscriptions that start at 2,50 € per month.

 

The service supports POP/IMAP and Exchange ActiveSync as well as vanity domains with SPF, DKIM, DMARC and catch-all address support. Users can send both plain and rich text emails, organize messages in folders and/or categorize them with tags, take notes by setting comment on each message and create default message signatures for every sender address. Different identities can also be managed using aliases and filters for incoming emails.

 

The service uses an open-source implementation of OpenPGP (RFC 4880) for emails.OpenPGP keypair is generated in client-browser, encrypted (via AES256) with the user's passphrase, and then stored on Mailfence server.The server never sees the user's OpenPGP keypair passphrase. The service also supports end-to-end encryption for emails using a shared password with the possibility of message expiration.


Comments ()


Sign in

Read Next

Cloud Computing: Threats and Vulnerabilities

Blog banner

Buffer Overflow

Blog banner

Technical SEO : Total Guide

Blog banner

Synchronization

Blog banner

BIRYANI ! The history you never knew about

Blog banner

Types of Malware in Cyber Security

Blog banner

Artical on FreshBooks

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

The Golden Temple , Amritsar

Blog banner

City of Mumbai (Bombay):

Blog banner

A buffer overflow

Blog banner

Veg Mix Pickle

Blog banner

1.1 basic elements

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Service Design Principles

Blog banner

Threads

Blog banner

Internet of Things

Blog banner

Processing Crime and Incident Scenes

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Indian Food

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Understanding Business Layer in Data Science

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Models of Information Security.

Blog banner

Sage business cloud accounting

Blog banner

Buffering

Blog banner

(Input/Output) in os

Blog banner

IT security management

Blog banner

Bharat Maps

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Virtualisation

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

How social media affect

Blog banner

Decoding Confusion Matrix

Blog banner

Linker

Blog banner

Compromising Mobile Platforms

Blog banner

Bit Coins

Blog banner

Full Disk Encryption

Blog banner

TRAIN TRAVELING

Blog banner

Secure Hypertext transfer protocol

Blog banner