Hushmail: Difference between revisions
Up-to-date info on offering |
|||
Line 18: | Line 18: | ||
}} |
}} |
||
'''Hushmail''' is a [[web-based email]] service offering [[Pretty Good Privacy|PGP]]-encrypted [[e-mail]] |
'''Hushmail''' is a [[web-based email]] service offering [[Pretty Good Privacy|PGP]]-encrypted [[e-mail]] and [[vanity domain]] service. Hushmail offers "free" and "paid" versions of service. Hushmail uses [[OpenPGP]] standards and the source is available for download. If [[public encryption key]]s are available to both recipient and sender (either both are Hushmail users or have uploaded PGP keys to the Hush keyserver), Hushmail can convey authenticated, encrypted messages in both directions. For recipients for whom no public key is available, Hushmail will allow a message to be encrypted by a password (with a password hint) and stored for pickup by the recipient, or the message can be sent in cleartext. The company will launch an iOS app that offers [[end-to-end encryption]] and full integration with the webmail settings. A beta version of the app is available for testing.<ref>{{Cite web|url=https://www.hushmail.com/ios/|title=Hushmail for iPhone|website=www.hushmail.com|access-date=2016-05-05}}</ref> |
||
==History== |
==History== |
||
Line 25: | Line 25: | ||
==Reception== |
==Reception== |
||
{{As of|2015|12|22|df=us}}, Hushmail has a score of 1 out of 7 points on the [[Electronic Frontier Foundation]]'s secure messaging scorecard. Hushmail has received a point for encryption during transit. It is missing points because communications are not encrypted with keys the provider doesn't have access to (i.e. the communications are not [[End-to-end encryption|end-to-end encrypted]]), users can't verify contacts' identities, past messages are not secure if the encryption keys are stolen (i.e. the service does not provide [[forward secrecy]]), the code is not open to independent review (i.e. the code is not [[Open-source software|open-source]]), the security design is not properly documented, and there has not been a recent independent security audit.<ref name="secure-messaging-scorecard">{{cite web |url=https://www.eff.org/secure-messaging-scorecard |publisher=[[Electronic Frontier Foundation]] |title=Secure Messaging Scorecard. Which apps and tools actually keep your messages safe? |date=4 November 2014 |accessdate=22 December 2015}}</ref><ref>{{cite web |url=http://www.pcmag.com/article2/0,2817,2471658,00.asp |work=[[PC Magazine]] |title=Only 6 Messaging Apps Are Truly Secure |date=5 November 2014 |accessdate=8 January 2015}}</ref |
{{As of|2015|12|22|df=us}}, Hushmail has a score of 1 out of 7 points on the [[Electronic Frontier Foundation]]'s secure messaging scorecard. Hushmail has received a point for encryption during transit. It is missing points because communications are not encrypted with keys the provider doesn't have access to (i.e. the communications are not [[End-to-end encryption|end-to-end encrypted]]), users can't verify contacts' identities, past messages are not secure if the encryption keys are stolen (i.e. the service does not provide [[forward secrecy]]), the code is not open to independent review (i.e. the code is not [[Open-source software|open-source]]), the security design is not properly documented, and there has not been a recent independent security audit.<ref name="secure-messaging-scorecard">{{cite web |url=https://www.eff.org/secure-messaging-scorecard |publisher=[[Electronic Frontier Foundation]] |title=Secure Messaging Scorecard. Which apps and tools actually keep your messages safe? |date=4 November 2014 |accessdate=22 December 2015}}</ref><ref>{{cite web |url=http://www.pcmag.com/article2/0,2817,2471658,00.asp |work=[[PC Magazine]] |title=Only 6 Messaging Apps Are Truly Secure |date=5 November 2014 |accessdate=8 January 2015}}</ref> |
||
==Accounts== |
==Accounts== |
||
===Individuals=== |
===Individuals=== |
||
A free e-mail account has a storage limit of 25MB, but does not include [[Internet Message Access Protocol|IMAP]] or [[Post Office Protocol]] (POP3) desktop service. If a user does not use a free account for three consecutive weeks, Hushmail deactivates the account. Customers attempting to reactivate a disabled account are required to pay for a Hushmail |
A free e-mail account has a storage limit of 25MB, but does not include [[Internet Message Access Protocol|IMAP]] or [[Post Office Protocol]] (POP3) desktop service. If a user does not use a free account for three consecutive weeks, Hushmail deactivates the account. Customers attempting to reactivate a disabled account are required to pay for a Hushmail Premium account. There is one type of paid account, Hushmail Premium, which provides 10GB of storage, as well as IMAP and POP3 service.<ref name="features">[http://www.hushmail.com/services/hushmail/features/ Hushmail – Features and Pricing]</ref> |
||
===Businesses=== |
===Businesses=== |
||
The standard business account provides the same features as |
The standard business account provides the same features as the paid individual account, plus other features like vanity domain, email forwarding, catch-all email and user admin. A standard business plan with email archiving is also available.<ref name="Business features">[https://www.hushmail.com/services/business/features/all/ – Hushmail Business Features]</ref> Features like secure forms and email archiving can be found in the healthcare and legal industry-specific plans.<ref>{{Cite web|url=https://www.hushmail.com/business/healthcare/|title=Hushmail for Healthcare|website=www.hushmail.com|access-date=2016-05-05}}</ref><ref>{{Cite web|url=https://www.hushmail.com/business/legal/|title=Hushmail for Law|website=www.hushmail.com|access-date=2016-05-05}}</ref> |
||
Additional security features include hidden [[IP address]]es in e-mail headers, [[two-step verification]]<ref name="Two-Step verification">[https://help.hushmail.com/entries/63282756-Two-step-verification – Two-Step Verification]</ref> and [[Health Insurance Portability and Accountability Act|HIPAA]] compliant encryption. |
Additional security features include hidden [[IP address]]es in e-mail headers, [[two-step verification]]<ref name="Two-Step verification">[https://help.hushmail.com/entries/63282756-Two-step-verification – Two-Step Verification]</ref> and [[Health Insurance Portability and Accountability Act|HIPAA]] compliant encryption. |
||
Line 53: | Line 53: | ||
==2015 DDoS Attacks== |
==2015 DDoS Attacks== |
||
In late 2015, |
In late 2015, Hushmail came under [[Denial-of-service attack|DDoS attack]]. In response, Hushmail deployed web traffic filtering technology. If there is an increased threat of a DDoS, Hushmail temporarily routes their traffic through a service known as [[Incapsula]] in order to continue to provide service to their users until the threat has subsided. |
||
==See also== |
==See also== |
Revision as of 18:03, 5 May 2016
This article needs to be updated.(February 2016) |
Type of site | Web-based email |
---|---|
Owner | Hush Communications Corp. |
Created by | Cliff Baltzley |
URL | Hushmail.com |
Registration | Yes |
Hushmail is a web-based email service offering PGP-encrypted e-mail and vanity domain service. Hushmail offers "free" and "paid" versions of service. Hushmail uses OpenPGP standards and the source is available for download. If public encryption keys are available to both recipient and sender (either both are Hushmail users or have uploaded PGP keys to the Hush keyserver), Hushmail can convey authenticated, encrypted messages in both directions. For recipients for whom no public key is available, Hushmail will allow a message to be encrypted by a password (with a password hint) and stored for pickup by the recipient, or the message can be sent in cleartext. The company will launch an iOS app that offers end-to-end encryption and full integration with the webmail settings. A beta version of the app is available for testing.[2]
History
Hushmail was founded by Cliff Baltzley in 1999 after he left Ultimate Privacy.
Reception
As of December 22, 2015[update], Hushmail has a score of 1 out of 7 points on the Electronic Frontier Foundation's secure messaging scorecard. Hushmail has received a point for encryption during transit. It is missing points because communications are not encrypted with keys the provider doesn't have access to (i.e. the communications are not end-to-end encrypted), users can't verify contacts' identities, past messages are not secure if the encryption keys are stolen (i.e. the service does not provide forward secrecy), the code is not open to independent review (i.e. the code is not open-source), the security design is not properly documented, and there has not been a recent independent security audit.[3][4]
Accounts
Individuals
A free e-mail account has a storage limit of 25MB, but does not include IMAP or Post Office Protocol (POP3) desktop service. If a user does not use a free account for three consecutive weeks, Hushmail deactivates the account. Customers attempting to reactivate a disabled account are required to pay for a Hushmail Premium account. There is one type of paid account, Hushmail Premium, which provides 10GB of storage, as well as IMAP and POP3 service.[5]
Businesses
The standard business account provides the same features as the paid individual account, plus other features like vanity domain, email forwarding, catch-all email and user admin. A standard business plan with email archiving is also available.[6] Features like secure forms and email archiving can be found in the healthcare and legal industry-specific plans.[7][8]
Additional security features include hidden IP addresses in e-mail headers, two-step verification[9] and HIPAA compliant encryption.
Instant messaging
An instant messaging service, Hush Messenger, was offered until July 1, 2011.[10]
Compromises to email privacy
Hushmail received favorable reviews in the press.[11][12] It was believed that possible threats, such as demands from the legal system to reveal the content of traffic through the system, were not imminent in Canada, unlike the United States, and that if data were to be handed over, encrypted messages would be available only in encrypted form.
Developments in November 2007 led to doubts among security-conscious users about Hushmail's security and concern over a backdoor. The issue originated with the non-Java version of the Hush system. It performed the encrypt and decrypt steps on Hush's servers and then used SSL to transmit the data to the user. The data is available as cleartext during this small window; the passphrase can be captured at this point, facilitating the decryption of all stored messages and future messages using this passphrase. Hushmail stated that the Java version is also vulnerable, in that they may be compelled to deliver a compromised java applet to a user.[13][14]
Hushmail turned over cleartext copies of private email messages associated with several addresses at the request of law enforcement agencies under a Mutual Legal Assistance Treaty with the United States.;[13] e.g. in the case of U.S. v. Tyler Stumbo.[13][14][15] In addition, the contents of emails between Hushmail addresses were analyzed, and 12 CDs were turned over to U.S. authorities. Hushmail privacy policy states that it logs IP addresses in order "to analyze market trends, gather broad demographic information, and prevent abuse of our services."[16]
Hush Communications, the company that provides Hushmail, states that it will not release any user data without a court order from the Supreme Court of British Columbia, Canada, and that other countries seeking access to user data must apply to the government of Canada via an applicable Mutual Legal Assistance Treaty.[14] Hushmail states that "...that means that there is no guarantee that we will not be compelled, under a court order issued by the Supreme Court of British Columbia, Canada, to treat a user named in a court order differently, and compromise that user's privacy" and "...if a court order has been issued by the Supreme Court of British Columbia compelling us to reveal the content of your encrypted email, the "attacker" could be Hush Communications, the actual service provider."[17]
2015 DDoS Attacks
In late 2015, Hushmail came under DDoS attack. In response, Hushmail deployed web traffic filtering technology. If there is an increased threat of a DDoS, Hushmail temporarily routes their traffic through a service known as Incapsula in order to continue to provide service to their users until the threat has subsided.
See also
- Comparison of webmail providers
- Lavabit (discontinued)
- ProtonMail
- Tutanota
- Kolab Now
- Anonymous remailer
- Bitmessage
- GNU Privacy Guard
- Pseudonymous remailer
- Secure channel
- Silent Circle
- Thomas Andrews Drake
References
- ^ "Hushmail.com Site Info". Alexa Internet. Retrieved 2016-02-11.
- ^ "Hushmail for iPhone". www.hushmail.com. Retrieved 2016-05-05.
- ^ "Secure Messaging Scorecard. Which apps and tools actually keep your messages safe?". Electronic Frontier Foundation. 4 November 2014. Retrieved 22 December 2015.
- ^ "Only 6 Messaging Apps Are Truly Secure". PC Magazine. 5 November 2014. Retrieved 8 January 2015.
- ^ Hushmail – Features and Pricing
- ^ – Hushmail Business Features
- ^ "Hushmail for Healthcare". www.hushmail.com. Retrieved 2016-05-05.
- ^ "Hushmail for Law". www.hushmail.com. Retrieved 2016-05-05.
- ^ – Two-Step Verification
- ^ Hushmail closes IM service
- ^ Alternative Web Mail Review – Hushmail Premium, PC Magazine
- ^ E-Mail Encryption Rare in Everyday Use: NPR
- ^ a b c Encrypted E-Mail Company Hushmail Spills to Feds |Threat Level via Wired.com
- ^ a b c Hushmail Privacy via Wired.com
- ^ bakersfield.com
- ^ "Hushmail.com Privacy Policy". Hushmail.com. Archived from the original on 2001-02-15.
- ^ Hushmail – Free Email with Privacy – About