The Problem With "Trust Us"

Many email providers claim they don't read your emails. And many are telling the truth — as a matter of policy. But policy is not a technical guarantee. A provider who promises not to read your data still has the technical capability to do so. This means:

  • A rogue employee could access your data
  • A court order could compel them to grant access
  • A data breach could expose your emails in readable form
  • The company could change its policy in the future

Privacy promises are only as strong as the incentives of the company making them. Zero-knowledge architecture removes the promise entirely — and replaces it with mathematics.

What "Zero-Knowledge" Actually Means

In cryptography, a zero-knowledge system is one where a party can prove they know something without revealing what they know. Applied to email storage, it means this: the email provider stores your data in a form they cannot read — even if they wanted to.

The key insight is where the encryption key lives. In a conventional system, the provider encrypts your data but keeps the key. In a zero-knowledge system, the key is derived from your password and only exists on your device.

The key difference: Conventional encryption = provider locks the safe and keeps a copy of the key. Zero-knowledge = you lock the safe, take the key home, and the provider only stores the locked safe.

How Zero-Knowledge Key Derivation Works

When you create a zero-knowledge email account, the following happens on your device:

  1. A strong cryptographic key is generated from your password using a key derivation function (KDF) like Argon2 or bcrypt
  2. This key is used to encrypt your private encryption key
  3. Only the encrypted version of your private key is sent to the server
  4. Your password — or any derivative of it — never leaves your device

When you log in, your password is used locally to decrypt your private key. The server verifies your identity without ever receiving your password in a usable form.

What This Means for Legal Requests

In 2021, a Swiss court ordered a European email provider to hand over user data. The provider complied — and the user's IP address was disclosed, leading to an arrest. This is legally possible because the provider had the technical capability to provide the data.

With zero-knowledge architecture, a court order to "hand over user emails" results in the provider handing over encrypted blobs. Without the user's private key — which the provider doesn't have — these blobs are computationally impossible to decrypt. The provider is legally compliant and technically useless to the attacker.

The Trade-Off: Password Recovery

Zero-knowledge architecture comes with one significant caveat: if you forget your password, your emails are permanently inaccessible. No password reset email, no customer support call can help — because the provider genuinely doesn't have access to your data.

This is why responsible zero-knowledge providers like enemail strongly encourage users to export a recovery key during setup. This key — which you store securely offline — is the only backup mechanism that exists.

Zero-Knowledge vs. End-to-End Encryption: The Difference

These terms are often used interchangeably but they describe different things:

  • End-to-end encryption (E2EE) describes the communication: messages are encrypted from sender to recipient, with no readable form in transit
  • Zero-knowledge describes the storage architecture: the provider stores data it cannot decrypt

The best secure email services implement both: E2EE for messages in transit, and zero-knowledge for stored data. This is what enemail provides. Our infrastructure runs exclusively on dedicated bare-metal servers by Evolushost, hosted in Frankfurt, Berlin and Vienna — entirely within EU jurisdiction, ensuring no foreign authority can compel physical access to our hardware.

How to Verify a Provider Is Truly Zero-Knowledge

The only way to verify zero-knowledge claims is through audited open-source cryptographic implementations. Look for providers that:

  • Publish their cryptographic code for public review
  • Have undergone independent security audits
  • Can explain exactly where keys are generated and stored
  • Do not offer "forgot password" resets that restore access to existing emails

Zero-knowledge, zero compromise

enemail uses zero-knowledge architecture. We store what we cannot read. Mathematical privacy, not just a policy.

Create your secure account