Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Other solutions that work as plug-ins for web browsers, or tools such as Mailvelope typically fail when it comes to using attachments from cloud storage; or cannot be used safely in untrusted environments like computers in Internet cafes, or those public PCs in hotels, for instance. Consider also that a range of cryptography experts have discovered various loopholes and uncertainties in the current encryption mechanisms of Javascript, and expressed doubts about whether reliable cryptographic methods could ever be realised using Javascript alone.

OX mailbox.org Guard is a server-side implementation of PGP where all users can create individual encryption keys without needing any particular technical expertise. Those users who are technically adept may of course still upload their own keys to OX mailbox.org Guard if they wish to do so, and can then use our system together with their local PGP setup. The advantage of this parallel configuration is that it allows secure access to communication data on the go, which includes any untrusted, public Internet terminals. Meanwhile, all encryption keys are kept safe on our servers, managed in a secure environment by our experienced team of IT professionals.

...

However, as the processes of encrypting and decrypting happen exclusively on the server, mailbox.org Guard can not offer true end-to-end encryption. This means the level of security offered here will not be sufficient for users with extremely high security requirements (like whistleblowers, for example). The primary aim of OX-mailbox.org Guard is to combine security and convenience to facilitate so-called “sufficient security”.

...

By the way, even if your communication partner happens not to be a mailbox.org customer and does not have an OpenPGP key, you can still communicate securely via OX mailbox.org Guard. We use temporary mailboxes for external users, which they can then use to receive, read, and reply to encrypted e-mails. Of course, these temporary accounts are also protected by dedicated login credentials, two-factor authentication, and SSL.

...