Purpose of KeyMail

KeyMail provides an unprecedented high degree of cybersecurity protection.

A rigorous analysis of KeyMail’s communication security features as compared to email/cloud system(s) plus ProtonMail; across all relevant dimensions – demonstrates that KeyMail is superior in all respects. KeyMail has a full compliment of 40 protective-measures, compared to just 6 for email/cloud and 11 for ProtonMail.

We could go on for quite a while detailing all of KeyMail’s unique features; but instead we list a number of important advantages below.

 

No. Feature KeyMail Email Cloud ProtonMail
1 Peer-To-Peer
2 Device-To-Device
3 Single-Copy-Send
4 No Central Copies
5 No Transfer Copies
6 No Replication Copies
7 No Organisation Copies
8 No Transmission Feeds (secret + encrypted protocol) ? ?
9 No Device Hacking (USB-Flash-Drive mode)
10 No Front-Door Logins
11 No Back-Door Logins (Administrators cannot access client-data) ?
12 Cypher-Matching
13 End-To-End Multi-Layer Encryption (Outer Layer = PGP (AES-RSA) + Inner Layer = Personal Key) ? ?
14 Packet Scrambling (Serial Algorithm)
15 Packet Scrambling (Modal Algorithm)
16 No Upload Delays
17 Live Authentication (post-communication tampering of User-ID impossible)
18 Live Verification (post-communication tampering of message + payload impossible)
19 Perfect Forward Secrecy ?
20 Supports One-Time-Pad (OTP) – communicants can change the Inner-Layer of Encryption by making new Personal Key(s) for each communication instance
21 Local Encryption Keys (User Owned)
22 Invitation Only Network / Circle-Of-Trust Network
23 No Spam
24 No CC / BCC
25 No Accidental Addressee
26 Adaptive Parallel Transfer (APT)
27 Multi-Threaded Application – Several messages / payload transfers can be live simultaneously
28 Secret Protocol
29 Separation of Device Verification and User-ID Verification
30 Private Networks Inherent ?
31 Private Server Grids ?
32 No Public Meta-Data / Digital Fingerprints ?
33 No Server Hacking – Immunity because service holds no client-data whatsoever
34 True Symmetric Encryption Layer (Physical swapping of Personal Keys)
35 AES 256 / RSA 4096 ?
36 Payload Limit 100 GB ? 25 MB
37 Service Neutrality
38 Anonymous Mode
39 Immune to Legal Requests ?
40 Zero Access Provider
Table 1: Comparison Of KeyMail Security Features

Advertisements