Public Roadmap

Built in the open.

We believe you should know what we're working on. This is our public roadmap — updated as we ship. Have a suggestion? Let us know.

✓ Shipped ⟳ In Progress ◷ Planned ⊙ Research
Foundation

Q1 2025 — Launch

✓ Shipped

End-to-end encrypted webmail

Full PGP/AES-256 encryption in the browser. Zero-knowledge architecture from day one.

✓ Shipped

@enemail.de addresses

Clean, private email addresses. No personal information required to sign up.

✓ Shipped

EU-only infrastructure

All servers on dedicated Evolushost hardware in Frankfurt, Berlin, and Vienna.

✓ Shipped

Spam & phishing protection

Server-side filters to block spam and phishing without scanning message content.

✓ Shipped

Waitlist & closed beta

Gradual rollout to ensure infrastructure stability before general availability.

Now

Q2 2025 — Core features

⟳ In Progress

Mobile apps (iOS & Android)

Native apps with biometric login and full E2E encryption. Same zero-knowledge guarantees as the web app.

⟳ In Progress

Custom domain support

Use your own domain (e.g. you@yourcompany.com) with full enemail encryption.

⟳ In Progress

IMAP/SMTP bridge

Use enemail with any email client — Thunderbird, Apple Mail, Outlook — while keeping E2E encryption.

◷ Planned

Disposable addresses

Generate unlimited throwaway addresses that forward to your main inbox. Perfect for signups and newsletters.

◷ Planned

Encrypted contact book

Store contacts end-to-end encrypted. Public keys are cached automatically for frequent recipients.

Coming up

Q3 2025 — Power features

◷ Planned

Encrypted calendar

A zero-knowledge calendar integrated with your inbox. Events, invites, and reminders — all encrypted.

◷ Planned

Encrypted file storage

Send and store attachments with the same zero-knowledge guarantees as your email.

◷ Planned

Team accounts & shared inboxes

Manage multiple users under one organisation. Shared inboxes with per-user access control.

◷ Planned

Auto-expiring messages

Set messages to automatically delete after a time period — on both sender and recipient side.

Future

Q4 2025 & beyond

⊙ Research

Post-quantum cryptography

Evaluating NIST-standardised post-quantum algorithms (CRYSTALS-Kyber, CRYSTALS-Dilithium) to future-proof encryption against quantum computers.

⊙ Research

Anonymous routing (onion)

Optional routing through Tor-like infrastructure to hide even the metadata of who is communicating with whom.

⊙ Research

Third-party security audit

Independent cryptographic audit by a reputable external security firm. Full results will be published.

⊙ Research

Open source client code

Publishing client-side encryption code for independent verification. We believe open-source encryption is stronger encryption.