Security Analysis

Technical explanation

Sensitive operations using your passphrase, private key, and the bodies of emails are performed by the Encryption Engine component. When you access your email, the Encryption Engine is activated on the web server. Your web browser will communicate over an encrypted SSL connection to the web server instructing the Encryption Engine to perform encryption, decryption, and signature functions using your private key and passphrase.


Details on what is protected

Type of Information Level of Protection
Source of random data when creating new PGP keys Entropy collected on the server
Passphrase encrypted in transmission from browser to web server SSL
Passphrase encrypted in storage on web server SHA256
Passphrase decrypted on web server The passphrase is used in decrypted form on the web server to decrypt the private key
Private key encrypted in transmission between browser to web server Private key not transmitted
Private key encrypted in storage PGP
Private key decrypted on web server Private key decrypted and used on server for decrypting and signing messages (for the duration of your session)
The following examples apply to emails sent using public key encryption:
Message body encrypted during transmission from browser to web server SSL
Message body encrypted during transmission between web server and recipient email account PGP (plus SSL if supported by recipient)
Message body encrypted in storage on web server PGP
Message body known to web server Yes, after the message emerges from SSL encryption, the body is temporarily exposed to the server before the PGP encryption takes effect
Message headers encrypted during transmission from browser to web server SSL
Message headers encrypted during transmission between web server and recipient email account SSL (if supported by recipient)
Message headers in storage on web server Not encrypted

Vulnerabilities analysis for webmail

Attack Level of Protection
The following examples apply to emails sent using public key encryption:
Attacker is listening to your Internet connection Protected
Attacker gets access to email stored on the server Protected
Attacker gets access to the server's databases Protected
Attacker compromises webserver after you have accessed your email Mostly protected (there is a chance some sensitive data could remain in memory)
Attacker fully controls webserver while you are accessing your email Not protected
Attacker fully controls webserver while you are first signing up for Hushmail Not protected
Attacker has access to your computer after you have accessed your email Mostly protected (there is a chance some sensitive data could remain in memory)
Attacker has access to your computer before you access your email (and can install programs such as key loggers) Not protected

Vulnerabilities analysis for Hushmail for iPhone app

Attack Level of Protection
The following examples apply to emails sent using public key encryption:
Attacker is listening to your Internet connection Protected
Attacker gets access to email stored on the server Protected
Attacker gets access to the server's databases Protected
Attacker compromises server after you have accessed your email Protected
Attacker fully controls server while you are accessing your email Protected
Attacker fully controls server while you are first signing up for Hushmail Not protected
Attacker has access to your device after you have accessed your email and locked the application Protected
Attacker has total access to your iPhone before you access your email and your device is jailbroken Not protected

Access to web traffic by third parties

As a general rule we do not allow any third party access to the unencrypted content transmitted from users' web browsers to our servers.


For more information, please see: https://www.hushmail.com/privacy/

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us