Jump to content

Hushmail: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Added {{update}} tag to article (TW)
Anabeli (talk | contribs)
Up-to-date info on offering
Line 18: Line 18:
}}
}}


'''Hushmail''' is a [[web-based email]] service offering [[Pretty Good Privacy|PGP]]-encrypted [[e-mail]], file storage and [[vanity domain]] service. Hushmail offers "free" and "paid" versions of service. Hushmail uses [[OpenPGP]] standards and the source is available for download. If [[public encryption key]]s are available to both recipient and sender (either both are Hushmail users or have uploaded PGP keys to the Hush keyserver), Hushmail can convey authenticated, encrypted messages in both directions. For recipients for whom no public key is available, Hushmail will allow a message to be encrypted by a password (with a password hint) and stored for pickup by the recipient, or the message can be sent in cleartext.
'''Hushmail''' is a [[web-based email]] service offering [[Pretty Good Privacy|PGP]]-encrypted [[e-mail]] and [[vanity domain]] service. Hushmail offers "free" and "paid" versions of service. Hushmail uses [[OpenPGP]] standards and the source is available for download. If [[public encryption key]]s are available to both recipient and sender (either both are Hushmail users or have uploaded PGP keys to the Hush keyserver), Hushmail can convey authenticated, encrypted messages in both directions. For recipients for whom no public key is available, Hushmail will allow a message to be encrypted by a password (with a password hint) and stored for pickup by the recipient, or the message can be sent in cleartext. The company will launch an iOS app that offers [[end-to-end encryption]] and full integration with the webmail settings. A beta version of the app is available for testing.<ref>{{Cite web|url=https://www.hushmail.com/ios/|title=Hushmail for iPhone|website=www.hushmail.com|access-date=2016-05-05}}</ref>


==History==
==History==
Line 25: Line 25:


==Reception==
==Reception==
{{As of|2015|12|22|df=us}}, Hushmail has a score of 1 out of 7 points on the [[Electronic Frontier Foundation]]'s secure messaging scorecard. Hushmail has received a point for encryption during transit. It is missing points because communications are not encrypted with keys the provider doesn't have access to (i.e. the communications are not [[End-to-end encryption|end-to-end encrypted]]), users can't verify contacts' identities, past messages are not secure if the encryption keys are stolen (i.e. the service does not provide [[forward secrecy]]), the code is not open to independent review (i.e. the code is not [[Open-source software|open-source]]), the security design is not properly documented, and there has not been a recent independent security audit.<ref name="secure-messaging-scorecard">{{cite web |url=https://www.eff.org/secure-messaging-scorecard |publisher=[[Electronic Frontier Foundation]] |title=Secure Messaging Scorecard. Which apps and tools actually keep your messages safe? |date=4 November 2014 |accessdate=22 December 2015}}</ref><ref>{{cite web |url=http://www.pcmag.com/article2/0,2817,2471658,00.asp |work=[[PC Magazine]] |title=Only 6 Messaging Apps Are Truly Secure |date=5 November 2014 |accessdate=8 January 2015}}</ref> [[AOL Instant Messenger|AIM]], [[BlackBerry Messenger]], [[eBuddy|Ebuddy XMS]], [[Kik Messenger]], [[Skype]], [[Viber]], and [[Yahoo! Messenger|Yahoo Messenger]] also have a score of 1 out of 7 points.<ref name="secure-messaging-scorecard" />
{{As of|2015|12|22|df=us}}, Hushmail has a score of 1 out of 7 points on the [[Electronic Frontier Foundation]]'s secure messaging scorecard. Hushmail has received a point for encryption during transit. It is missing points because communications are not encrypted with keys the provider doesn't have access to (i.e. the communications are not [[End-to-end encryption|end-to-end encrypted]]), users can't verify contacts' identities, past messages are not secure if the encryption keys are stolen (i.e. the service does not provide [[forward secrecy]]), the code is not open to independent review (i.e. the code is not [[Open-source software|open-source]]), the security design is not properly documented, and there has not been a recent independent security audit.<ref name="secure-messaging-scorecard">{{cite web |url=https://www.eff.org/secure-messaging-scorecard |publisher=[[Electronic Frontier Foundation]] |title=Secure Messaging Scorecard. Which apps and tools actually keep your messages safe? |date=4 November 2014 |accessdate=22 December 2015}}</ref><ref>{{cite web |url=http://www.pcmag.com/article2/0,2817,2471658,00.asp |work=[[PC Magazine]] |title=Only 6 Messaging Apps Are Truly Secure |date=5 November 2014 |accessdate=8 January 2015}}</ref>


==Accounts==
==Accounts==
===Individuals===
===Individuals===


A free e-mail account has a storage limit of 25MB, but does not include [[Internet Message Access Protocol|IMAP]] or [[Post Office Protocol]] (POP3) desktop service. If a user does not use a free account for three consecutive weeks, Hushmail deactivates the account. Customers attempting to reactivate a disabled account are required to pay for a Hushmail premium account. There are two types of paid accounts. The basic Premium paid account provides 1 GB of storage, without desktop service. The Premium+Desktop paid account provides 10GB of storage, as well as IMAP and POP3 service.<ref name="features">[http://www.hushmail.com/services/hushmail/features/ Hushmail – Features and Pricing]</ref> Free account registration is no longer available.
A free e-mail account has a storage limit of 25MB, but does not include [[Internet Message Access Protocol|IMAP]] or [[Post Office Protocol]] (POP3) desktop service. If a user does not use a free account for three consecutive weeks, Hushmail deactivates the account. Customers attempting to reactivate a disabled account are required to pay for a Hushmail Premium account. There is one type of paid account, Hushmail Premium, which provides 10GB of storage, as well as IMAP and POP3 service.<ref name="features">[http://www.hushmail.com/services/hushmail/features/ Hushmail – Features and Pricing]</ref>


===Businesses===
===Businesses===


The standard business account provides the same features as Premium+Desktop, plus other features like email forwarding, catch-all email and vanity domain. Optional features that can be added for an extra fee include: secure web forms, user admin, reset passphrase and email archiving.<ref name="Business features">[https://www.hushmail.com/services/business/features/all/ – Hushmail Business Features]</ref>
The standard business account provides the same features as the paid individual account, plus other features like vanity domain, email forwarding, catch-all email and user admin. A standard business plan with email archiving is also available.<ref name="Business features">[https://www.hushmail.com/services/business/features/all/ – Hushmail Business Features]</ref> Features like secure forms and email archiving can be found in the healthcare and legal industry-specific plans.<ref>{{Cite web|url=https://www.hushmail.com/business/healthcare/|title=Hushmail for Healthcare|website=www.hushmail.com|access-date=2016-05-05}}</ref><ref>{{Cite web|url=https://www.hushmail.com/business/legal/|title=Hushmail for Law|website=www.hushmail.com|access-date=2016-05-05}}</ref>


Additional security features include hidden [[IP address]]es in e-mail headers, [[two-step verification]]<ref name="Two-Step verification">[https://help.hushmail.com/entries/63282756-Two-step-verification – Two-Step Verification]</ref> and [[Health Insurance Portability and Accountability Act|HIPAA]] compliant encryption.
Additional security features include hidden [[IP address]]es in e-mail headers, [[two-step verification]]<ref name="Two-Step verification">[https://help.hushmail.com/entries/63282756-Two-step-verification – Two-Step Verification]</ref> and [[Health Insurance Portability and Accountability Act|HIPAA]] compliant encryption.
Line 53: Line 53:
==2015 DDoS Attacks==
==2015 DDoS Attacks==


In late 2015, the Hushmail came under [[Denial-of-service attack|DDoS attack]]. In response, Hushmail deployed [[CloudFlare]]'s web traffic filtering technology. CloudFlare now negotiates [[Transport_Layer_Security|TLS]] connections with customers of Hushmail before passing validated traffic on to Hushmail servers. CloudFlare is an American company located in San Francisco, California.
In late 2015, Hushmail came under [[Denial-of-service attack|DDoS attack]]. In response, Hushmail deployed web traffic filtering technology. If there is an increased threat of a DDoS, Hushmail temporarily routes their traffic through a service known as [[Incapsula]] in order to continue to provide service to their users until the threat has subsided.


==See also==
==See also==

Revision as of 18:03, 5 May 2016

Hushmail
Type of site
Web-based email
OwnerHush Communications Corp.
Created byCliff Baltzley
URLHushmail.com
RegistrationYes

Hushmail is a web-based email service offering PGP-encrypted e-mail and vanity domain service. Hushmail offers "free" and "paid" versions of service. Hushmail uses OpenPGP standards and the source is available for download. If public encryption keys are available to both recipient and sender (either both are Hushmail users or have uploaded PGP keys to the Hush keyserver), Hushmail can convey authenticated, encrypted messages in both directions. For recipients for whom no public key is available, Hushmail will allow a message to be encrypted by a password (with a password hint) and stored for pickup by the recipient, or the message can be sent in cleartext. The company will launch an iOS app that offers end-to-end encryption and full integration with the webmail settings. A beta version of the app is available for testing.[2]

History

Hushmail was founded by Cliff Baltzley in 1999 after he left Ultimate Privacy.

Reception

As of December 22, 2015, Hushmail has a score of 1 out of 7 points on the Electronic Frontier Foundation's secure messaging scorecard. Hushmail has received a point for encryption during transit. It is missing points because communications are not encrypted with keys the provider doesn't have access to (i.e. the communications are not end-to-end encrypted), users can't verify contacts' identities, past messages are not secure if the encryption keys are stolen (i.e. the service does not provide forward secrecy), the code is not open to independent review (i.e. the code is not open-source), the security design is not properly documented, and there has not been a recent independent security audit.[3][4]

Accounts

Individuals

A free e-mail account has a storage limit of 25MB, but does not include IMAP or Post Office Protocol (POP3) desktop service. If a user does not use a free account for three consecutive weeks, Hushmail deactivates the account. Customers attempting to reactivate a disabled account are required to pay for a Hushmail Premium account. There is one type of paid account, Hushmail Premium, which provides 10GB of storage, as well as IMAP and POP3 service.[5]

Businesses

The standard business account provides the same features as the paid individual account, plus other features like vanity domain, email forwarding, catch-all email and user admin. A standard business plan with email archiving is also available.[6] Features like secure forms and email archiving can be found in the healthcare and legal industry-specific plans.[7][8]

Additional security features include hidden IP addresses in e-mail headers, two-step verification[9] and HIPAA compliant encryption.

Instant messaging

An instant messaging service, Hush Messenger, was offered until July 1, 2011.[10]

Compromises to email privacy

Hushmail received favorable reviews in the press.[11][12] It was believed that possible threats, such as demands from the legal system to reveal the content of traffic through the system, were not imminent in Canada, unlike the United States, and that if data were to be handed over, encrypted messages would be available only in encrypted form.

Developments in November 2007 led to doubts among security-conscious users about Hushmail's security and concern over a backdoor. The issue originated with the non-Java version of the Hush system. It performed the encrypt and decrypt steps on Hush's servers and then used SSL to transmit the data to the user. The data is available as cleartext during this small window; the passphrase can be captured at this point, facilitating the decryption of all stored messages and future messages using this passphrase. Hushmail stated that the Java version is also vulnerable, in that they may be compelled to deliver a compromised java applet to a user.[13][14]

Hushmail turned over cleartext copies of private email messages associated with several addresses at the request of law enforcement agencies under a Mutual Legal Assistance Treaty with the United States.;[13] e.g. in the case of U.S. v. Tyler Stumbo.[13][14][15] In addition, the contents of emails between Hushmail addresses were analyzed, and 12 CDs were turned over to U.S. authorities. Hushmail privacy policy states that it logs IP addresses in order "to analyze market trends, gather broad demographic information, and prevent abuse of our services."[16]

Hush Communications, the company that provides Hushmail, states that it will not release any user data without a court order from the Supreme Court of British Columbia, Canada, and that other countries seeking access to user data must apply to the government of Canada via an applicable Mutual Legal Assistance Treaty.[14] Hushmail states that "...that means that there is no guarantee that we will not be compelled, under a court order issued by the Supreme Court of British Columbia, Canada, to treat a user named in a court order differently, and compromise that user's privacy" and "...if a court order has been issued by the Supreme Court of British Columbia compelling us to reveal the content of your encrypted email, the "attacker" could be Hush Communications, the actual service provider."[17]

2015 DDoS Attacks

In late 2015, Hushmail came under DDoS attack. In response, Hushmail deployed web traffic filtering technology. If there is an increased threat of a DDoS, Hushmail temporarily routes their traffic through a service known as Incapsula in order to continue to provide service to their users until the threat has subsided.

See also

References

  1. ^ "Hushmail.com Site Info". Alexa Internet. Retrieved 2016-02-11.
  2. ^ "Hushmail for iPhone". www.hushmail.com. Retrieved 2016-05-05.
  3. ^ "Secure Messaging Scorecard. Which apps and tools actually keep your messages safe?". Electronic Frontier Foundation. 4 November 2014. Retrieved 22 December 2015.
  4. ^ "Only 6 Messaging Apps Are Truly Secure". PC Magazine. 5 November 2014. Retrieved 8 January 2015.
  5. ^ Hushmail – Features and Pricing
  6. ^ – Hushmail Business Features
  7. ^ "Hushmail for Healthcare". www.hushmail.com. Retrieved 2016-05-05.
  8. ^ "Hushmail for Law". www.hushmail.com. Retrieved 2016-05-05.
  9. ^ – Two-Step Verification
  10. ^ Hushmail closes IM service
  11. ^ Alternative Web Mail Review – Hushmail Premium, PC Magazine
  12. ^ E-Mail Encryption Rare in Everyday Use: NPR
  13. ^ a b c Encrypted E-Mail Company Hushmail Spills to Feds |Threat Level via Wired.com
  14. ^ a b c Hushmail Privacy via Wired.com
  15. ^ bakersfield.com
  16. ^ "Hushmail.com Privacy Policy". Hushmail.com. Archived from the original on 2001-02-15.
  17. ^ Hushmail – Free Email with Privacy – About