Email Security

Encryption is the answer.

""

Email security and privacy awareness course

Achieving online privacy and security is not an easy feat, so that’s why we created this email security and privacy course to enrich the learning and awareness of our users. For that reason, we made

""

OpenPGP digital signature best practices

In a recent post, we discussed the OpenPGP encryption best practices. Digital signatures on the other hand are also a vital part of OpenPGP which gets used both by advanced and entry level users. In this blogpost we would

mailfence mobile app

OpenPGP encryption best practices

Strong encryption is no longer a privilege of geeks and paranoids but is becoming mainstream. However, true end-to-end encryption is not out-of-the-box and generally requires you to activate a number of switches as described in this

""

Security advisory regarding Yahoo hack

Yahoo recently confirmed a massive breach of over 500 million email accounts, including both credentials and security questions. At Mailfence – a secure and private email service, the security team was closely monitoring developments since

desktop screenshot of mailfence private and secure email

Why mailfence is a unique secure and private email service

What is Mailfence about? Mailfence is not just a secure and private email service that values email privacy. It is also an extremely rich platform in terms of features. In this post, we’ll compare Mailfence with some other

linux icon

Mailfence is not vulnerable to GNU/Linux TCP Vulnerability

Recently a GNU/Linux TCP vulnerability was disclosed (CVE-2016-5696) by security researchers in the US. Upon analysis, this bug did not pose a threat to our users. Nevertheless, we have already taken supplementary measures in the last

vector of security analysis

Mailfence high-level security analysis

Mailfence is a secure and private email service that provides end-to-end encryption email and digital signing features. All crypto operations relating to private key, and the bodies of emails are performed after user unlocks the private key