wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MAILFENCE

profile
Rahul Panchal
Aug 24, 2022
0 Likes
0 Discussions
97 Reads

Mailfence is an encrypted email service that offers OpenPGP based end-to-end encryption and digital signatures. It was launched in November 2013 by ContactOffice Group, which has been operating an online collaboration suite for universities and other organizations since 1999.

 

In the midst of 2013, the Mailfence project was started by the founders of ContactOffice. In March 2016, a beta version of end-to-end encryption and digital signatures for emails was released. In January 2021, Mailfence released progressive web application for mobile devices.

 

Mailfence provides secure email features, with other functions such as Calendar, Contacts, Documents and Collaboration.Encryption and Two-factor authentication are available in the free version of the product. Most other features are only available with paid subscriptions that start at 2,50 € per month.

 

The service supports POP/IMAP and Exchange ActiveSync as well as vanity domains with SPF, DKIM, DMARC and catch-all address support. Users can send both plain and rich text emails, organize messages in folders and/or categorize them with tags, take notes by setting comment on each message and create default message signatures for every sender address. Different identities can also be managed using aliases and filters for incoming emails.

 

The service uses an open-source implementation of OpenPGP (RFC 4880) for emails.OpenPGP keypair is generated in client-browser, encrypted (via AES256) with the user's passphrase, and then stored on Mailfence server.The server never sees the user's OpenPGP keypair passphrase. The service also supports end-to-end encryption for emails using a shared password with the possibility of message expiration.


Comments ()


Sign in

Read Next

HACKING MOBILE PLATFORM

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Components of GIS

Blog banner

(Input/Output) in os

Blog banner

Animal’s have my heart

Blog banner

Fashion marketing in india

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Social Media.

Blog banner

VPN

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Raid and levels of raid.

Blog banner

Operating system

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Technological Advancement

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Deadlock in operating system

Blog banner

Why home remedies don’t work for Hangover?

Blog banner

Types of Big Data

Blog banner

Honeypot in cyber security

Blog banner

Some facts about Technology

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Functions of Operating System

Blog banner

Mumbai Metro 3

Blog banner

Simple Ways to Grow Your Brand Online

Blog banner

Service Transition Process in ITSM

Blog banner

Starvation

Blog banner

What is process

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Pooja Silver

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Elegant fashion style

Blog banner

Threads in OS

Blog banner

Deadlock Prevention

Blog banner

Strengthening Active Directory Security

Blog banner

Evolution of Operating system.

Blog banner

INTRANET

Blog banner

OS Evolution Achievements

Blog banner