Physical Security

KeyMail’s infrastructure resides in Europe’s most secure datacenter – based in Geneva, Switzerland. Unlike the competition, our relay-servers do not hold copies of your private account details, messages, encryption keys or payload files. Thus KeyMail is not vulnerable to client-data loss/hacking in any way whatsoever.

The advantage of having our relay-servers located Switzerland – servers which simply route client-data between client-computers – is to ensure that KeyMail remains immune to Government Shutdowns and Client-ID Surrender Warrants etc.

Scientific Heritage

Scientific method brings clarity of thought to the cybersecurity field.  One example is the breaking down of traditional security paradigms. For instance, systems like ProtonMail store encrypted client-data centrally for unknown periods of time – and possibly forever – on the assumption that such information is safe from attack.

But today’s strongest encryption methods will – no doubt – be trivially broken into at some future date – and so these same ‘stationary’ copies will become vulnerable to attack. In fact, central-server copies (of client-data and/or keys) may be hacked far sooner; due to the existence of unsafe public logins (front-doors) plus risky system administrator logins (back-doors) etc; potentially resulting in a critical exposure of client-data.

The precise date when today’s encryption methods will be cracked, remains an open question. But most experts agree that they will be rendered irrelevant at some point – and with the emergence of Quantum Computing this eventuality is fast approaching.

My question to you is, why take the risk of creating long-term central-server copies of your most sensitive items (protected by yesterday’s algorithms) – if you don’t have to.

Impossible To Hack

Two standard military based strategies have been used for protection with great success throughout the ages, named as camouflage/misdirection and also the difficulty an attacker has in hitting a moving target.

KeyMail employs both of these techniques to good effect. Other systems leave multiple stationary copies of client-data in the ‘Cloud’—including logins/messages/payloads/keys—which are open to endless new hacking-attacks forever-and-a-day. Whereas KeyMail has only local-copies of client-data, plus uses Single-Copy-Send which exposes the payload to attack only for a very short time-window: during real-time transfer.

Faced with KeyMail, and to be successful, an attacker would have to identify, extract and decrypt live KeyMail payload-data from vast amounts of live Internet traffic—which is next to impossible to do in practice.