Cloud Copies Are Inherently Risky
With ordinary email the “send” action is deceptive. What actually happens is that the message (+ attachments) are copied onto innumerable Internet computers, stored onto a cloud server, and then backed up and replicated / kept-forever. As a result, your information is unprotected and open to theft, copying or eavesdropping.
The problem with such ‘cloud’ file sharing methods is that even when they do employ encryption, they rely on insecure algorithms with the additional risk of exposed ‘central-server’ copies of encryption keys, client-data and user-accounts. KeyMail avoids each of these troubling vulnerabilities, using a comprehensive set of anti-surveillance measures.
For email systems (& cloud file-sharing), at least six types of vulnerability are present:
- User impersonation
- Physical device infiltration
- Transmission provider feed
- Account hacking (front-door)
- Communications eavesdropping
- Cloud provider access (back-door)
Notably for an email system with cryptography, then these dangers remain, and because long-term hacking risks are tied to data persistence.
When it comes to communications security, it is vital to understand that client-data security is all about protecting copies.
For Absolute Security, KeyMail eliminates all third-party copies. Accordingly—of the six classes of vulnerability listed above, with KeyMail 5/6 are rendered impossible. Ergo we have just one attack-vector left for the potential hacker—physical device infiltration. But this latter option is the most difficult to break into, requiring the attacker to traverse firewalls and virus checking software using highly sophisticated intrusion methods.
And for anyone who wished to avoid even this latter kind of attack, the entire KeyMail system can run from a USB-Flash-Drive—a world’s first—where files go directly from one USB-Flash-Drive to another.
Today many organisations need to safeguard valuable digital products from commercial threats and leaks, or they have a legal requirement to protect client data privacy.
KeyMail employs a comprehensive Threat Model; and the resulting Security Policies are truly world-leading. Importantly this Threat Model is future-proofed; because it does not persist copies of client-data to third-party companies and/or the cloud. Nobody, not even us—can possibly—hold copies of your private data, encryption keys and/or user details—even for a fraction of a second!
In a nutshell, KeyMail offers the best protection with no digital footprints, and therefore no hacking chances. Protecting digital information from the dangers of multiple-copies and sustained storage-related threats is the Holy Grail of data security, and this is why KeyMail is Absolute Security.