A Total End To End Encrypted, Unbreakable, Browser Based E-mail Solution Without Backdoors
Everyone communicates and interacts with other people and very often we write letters to other people using different media. When we are on holidays we send postcards with colorful pictures and short messages on the back. Since we don’t care if someone reads that message and looks at that picture, we don’t bother to use an envelope. When we write sensitive and personal letters we use an envelope, as with all business correspondence we use envelopes and corporate seals. Those who are more security conscious use a tape on the back of the envelope in order to detect if someone has tampered with the mail. We also use couriers or hand delivery services, however those can be rather expensive, and process of sending and receiving letters by post is time consuming.. So what do we do? We use electronic mail! It is fast, cheap and almost everyone has one nowadays. We need to use e-mail in this fast-moving technology age to keep up with the rapid pace at which things happen, and in a very short time email has become a major global communication tool. Corporations, government agencies and millions of ordinary citizens use e-mails on a daily basis. All these messages are sent as postcards without envelopes, because anyone who chooses to, can with very little effort, intercept and read those messages.
Your personal, legal, financial, medical and credit card details can all be stolen and abused if you use them in your emails. People often hear of hacker stories and say, "I have nothing to hide or why would hackers be interested in me?" It’s not only the hackers ‘out there’ you have to worry about; you can interest people much closer to home. It is believed that six out or every ten employers are monitoring all their employee emails in the US.
Then of course we have our own governments that snoop on us more and more. You may have heard of "Carnivore" used in the US by the FBI to record and monitor all the traffic at your local ISP. Then there is "Echelon" that is used by all major English speaking governments to snoop on worldwide communications. Competition in business is ever there, increasingly using electronic means to snoop on you. In the old days if you had a factory for example, your competitor would send a private eye with notepad and pen who would write down how many trucks went through your gates, with what product and calculated your volume of business. Nowadays, just intercepting your e-mail, or even by going through your garbage can do it all. So even that needs to be securely disposed of. If you say, "Well I do not own a multi-national company so nobody would be interested in me" Think again and smell the coffee! We live in a society where information costs more and more and those who pay can get anything on you. Nowadays more people get sued and have to pay out big bucks just because information about their net-worth and what they own is so easily available.
Remember that those e-mails are stored and can be retrieved, the data in them can be analyzed and entered into databases for later use. Even in our private lives, jealous husbands and wives don’t have to use private investigators to follow us around anymore. They simply read our e-mails. A simple case comes to mind where a wife used a simple link on the web based e-mail system that allowed retrieval of a password that is forgotten. Naturally she knew her husband well and answered the test question correctly, received the password via e-mail and read all of his private e-mails. I do not want to break into moral discussions however I strongly believe that certain things are very private and no one, I repeat NO ONE, has the right to read or have access to them without your permission. There is no need to cite other examples, as we all know the importance of covering that letter and hiding it from the public. In other words we need to protect our data, and our e-mail communication. That protection, that envelope is called "encryption."
There are many ways of using encryption to protect our data. However encryption alone is not the solution. Having full security is what the phenomenon is all about. One has to analyze all the needs, consider the loopholes that could possibly occur and think through what would actually work. There are many products out there and all of them claim that their encryption is unbreakable and secure.
I have no idea if all those secure communication systems are really what they claim to be. In many cases only National Security Agency possibly would know or some spotty face, teenage, glasses-wearing, coke-drinking whiz kid hacker. I believe that the way to find the right solution is to look at what would be right for me. What features this system should have and how it should be set-up. If the system worked for me, with the rigid criteria I sought, then it should naturally work for most people.
So I came up with a big list of requirements for my Group of companies. I consulted daily with people in sensitive areas of finance and law, and therefore understand from a first hand experience what exactly is needed. Often clients put their lives in a business’s hands as they trust them to structure their personal and business affairs. Naturally they would not want anyone to have access to their private information, and things that their heir’s future depends on for any reason at all. Or worse, that the safety of their information depends on a chain with weak links.
The first thing I decided was that I needed the strongest encryption algorithm available in the world today. Meganet´s Virtual Matrix Encryption (VME) was the winner by far. VME is the Only Deterministic Algorithm in the World to Work in Polynomial Time. VME is the major breakthrough in solving a 400-year-old mathematical problem how to positively identify a prime number without spending exponential time in dividing the number by all the primes up to its root. VME includes the possibility of using a ONE MILLION BIT SYMMETRIC KEY. No computer power on earth for many years could break this algorithm.
The next important aspect was that the whole system should be designed in a safe environment and that all the servers and systems should be located in a safe, secure and neutral ground. No developed Superpower or any country in Europe passed this test.
If the servers are in, lets say, the US, UK or in any other developed country there would be the possibility that those governments could find a way to access and tamper with the data of their clients. So the servers need to be based in a safe location that has local government privacy laws protecting them. Also a solid, state of the art security system would have to protect the entire installation grounds and facilities. The software operating the program would also have to be the best there is.
Other functions were looked at as well, included that all data should be encrypted on the sender’s machine and remain encrypted until arriving to the receiver’s machine and should stay encrypted all the time on the server. The system should not have any monitoring nor password recovery possibilities, as your security is only as strong is your weakest link. Furthermore no data should remain on the user’s machine. In many suppressive countries, using encryption is against the law and finding encrypted files on computers could get people prosecuted. A regular browser should access the system so you can access the system anywhere in the world. In addition to everything listed above I was also constantly looking for more functionality that can be easily added on. The system should also give the possibility of receiving bank statements in a secure manner, so there is no hardcopy, and the information could be viewed and securely deleted thereafter. There should be the option to instruct the banks via this system to do wire transactions and other online business without having to worry about it turning up in any database. The system should also be easy to operate and not take everlastingly long to load up a single page.
Naturally if I found such a system, I would tell the world, alerting other service providers, professionals, and ordinary citizens also concerned with privacy about the breakthrough. It has taken countless hours of research in techniques of snoopers and many other areas in order to come across a universally secure communication system that would satisfy my needs, but I found it!
Templemail, a secure and viable end-to-end encrypted web based communication service had the answers I was looking for. That system incorporates Virtual Matrix Encryption and has several user-friendly features and no built in back doors, it is a truly marvelous system.
Editors note: As a exclusive promotion for this special edition of Business World, we have organized a for a limited time, that if you enter the registration code "CAT1" you do not have to pay the $10 registration fee for a Templemail account when you sign up on their website. Experience the privacy feel the protection and start sleeping peacefully again.
The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.