Hushmail Technology

The need for Hushmail

Every day people around the world send millions of emails. Many of these are transmitted without using any form of encryption. When you send an email without using encryption it can potentially be monitored, logged, analyzed and stored by your employer, your Internet service provider and other parties.

In addition to the basic human right to privacy, email users must consider the importance of keeping business communications secure from rival organizations and should only send sensitive information in an encrypted format. The same concerns apply to the transmission of medical records, and sensitive legal, military or personal information.

How does Hushmail help?

Hushmail can keep your email private by encoding the contents of your messages using encryption. Encryption is a way of transforming a message so that it is unreadable to anyone who cannot access the key needed to unlock it. Hushmail makes encryption seamless and transparent; we encrypt your message automatically when it is sent and restore it back to its original form when the recipient reads it.

We use open standards

Hushmail uses industry standard algorithms as specified by the Open PGP Standard (RFC 2440) to ensure the security, privacy and authenticity of your email. In addition, all communications between you and our servers use a secure connection (our A+ grade SSL/TLS connection is rated by Qualsys SSL Labs).

With Hushmail, all you need to remember is your passphrase. Hushmail takes care of everything else in the background. This seamless and transparent encryption process makes Hushmail one of the most user-friendly secure email solutions available.

When you send an email from Hushmail to another Hushmail member, we encrypt the contents of the email and deliver it to that member’s Inbox. When that member later opens the email it will automatically be decrypted.

When you send an email from Hushmail to someone who is using another email provider, you can choose to encrypt the contents of the email by typing a secret question and answer. The recipient must be able to answer that question in order to decrypt and read the email.