We built enemail so that even we cannot read your messages. Not because we have to — because it's the only way privacy should work. Here's exactly how.
Zero-knowledge means that enemail's servers only ever store ciphertext — encrypted data that is mathematically impossible to read without your private key. Your private key never leaves your device in readable form.
When you log in, your password is used to derive a key locally on your device. That key decrypts your private key locally. The decrypted private key then decrypts your emails — all in your browser or app, never on our servers.
We use only well-established, peer-reviewed algorithms. No proprietary "black box" encryption — everything can be independently verified.
Email content is encrypted with AES-256 in Galois/Counter Mode. GCM provides both confidentiality and authentication — tampered ciphertext is detected and rejected.
Asymmetric key pairs use 4096-bit RSA. Your public key encrypts the session key; only your private key can decrypt it. Brute-forcing a 4096-bit key is computationally impossible.
Your password is never stored. It's processed through Argon2id (memory-hard key derivation) before being used to encrypt your private key. Even with server access, passwords cannot be recovered.
All data in transit is protected with TLS 1.3 — the latest and most secure transport protocol. Older, vulnerable versions (TLS 1.0/1.1, SSL) are disabled entirely.
Full PGP support for encrypted communication with non-enemail users. Import/export keys, sign messages, and communicate with the global PGP ecosystem.
Each email session uses ephemeral keys. Even if a long-term key is ever compromised in the future, previously encrypted messages remain secure and unreadable.
enemail runs exclusively on dedicated bare-metal servers by Evolushost located in Frankfurt, Berlin, and Vienna. No shared cloud, no US hyperscalers, no jurisdictional grey areas.
Dedicated hardware means no noisy neighbours, no hypervisor attacks, and no cloud provider able to image your server. Physical access is restricted and monitored 24/7.
Austrian jurisdiction · GDPR · No US CLOUD Act exposure
Being honest about what a security system can and cannot do is part of good security. Here's our threat model.
We take security reports seriously. If you discover a security vulnerability in enemail, please report it responsibly. We commit to acknowledging reports within 48 hours and to working with researchers to resolve issues before public disclosure.
We are building a formal bug bounty programme. In the meantime, please reach out directly.
PGP-encrypted reports welcome
Not promises. Not policies. Mathematical guarantees.