Jump to content

Hushmail

From Wikipedia, the free encyclopedia
Hushmail
Type of site
Webmail
HeadquartersVancouver, British Columbia, Canada
OwnerHush Communications Ltd
Created byCliff Baltzley
URLHushmail.com
CommercialYes
RegistrationRequired
Launched1999
Current statusOnline
Content license
Proprietary

Hushmail is an encrypted proprietary web-based email service offering PGP-encrypted e-mail and vanity domain service. Hushmail uses OpenPGP standards. If public encryption keys are available to both recipient and sender (either both are Hushmail users or have uploaded PGP keys to the Hush keyserver), Hushmail can convey authenticated, encrypted messages in both directions. For recipients for whom no public key is available, Hushmail will allow a message to be encrypted by a password (with a password hint) and stored for pickup by the recipient, or the message can be sent in cleartext. In July 2016, the company launched an iOS app that offers end-to-end encryption and full integration with the webmail settings. The company is located in Vancouver, British Columbia, Canada.[1][2]

History

[edit]

Hushmail was founded by Cliff Baltzley in 1999 after he left Ultimate Privacy.

Accounts

[edit]

Individuals

[edit]

There is one type of paid account, Hushmail for Personal Use, which provides 10GB of storage, as well as IMAP and POP3 service.[3]

Businesses

[edit]

The standard business account provides the same features as the paid individual account, plus other features like vanity domain, email forwarding, catch-all email, user admin, archive, and Business Associate Agreements for healthcare plans. Features like secure forms and electronic signatures are available in specific plans.[4][5][6]

Additional security features include hidden IP addresses in e-mail headers, two-step verification[7] and HIPAA-compliant encryption.[8]

Instant messaging

[edit]

An instant messaging service, Hush Messenger, was offered until July 1, 2011.[9]

Compromises to email privacy

[edit]

Hushmail received favorable reviews in the press.[10][11] It was believed that possible threats, such as demands from the legal system to reveal the content of traffic through the system, were not imminent in Canada – unlike the United States – and that if data were to be handed over, encrypted messages would be available only in encrypted form.

Developments in November 2007 led to doubts amongst security-conscious users about Hushmail's security – specifically, concern over a backdoor. The issue originated with the non-Java version of the Hush system. It performed the encrypt/decrypt steps on Hush's servers, and then used SSL to transmit the data to the user. The data is available as cleartext during this small window of time, with the passphrase being capturable at this point, facilitating the decryption of all stored messages and future messages using this passphrase. Hushmail stated that the Java version is also vulnerable, in that they may be compelled to deliver a compromised Java applet to a user.[12][13]

Hushmail supplied cleartext copies of private email messages associated with several addresses at the request of law enforcement agencies under a Mutual Legal Assistance Treaty with the United States:[12] e.g. in the case of United States v. Stumbo.[12][13][14] In addition, the contents of emails between Hushmail addresses were analyzed, and 12 CDs were supplied to U.S. authorities. Hushmail privacy policy states that it logs IP addresses in order "to analyze market trends, gather broad demographic information, and prevent abuse of our services."[15]

Hush Communications, the company that provides Hushmail, states that it will not release any user data without a court order from the Supreme Court of British Columbia, Canada and that other countries seeking access to user data must apply to the government of Canada via an applicable Mutual Legal Assistance Treaty.[13] Hushmail states, "...that means that there is no guarantee that we will not be compelled, under a court order issued by the Supreme Court of British Columbia, Canada, to treat a user named in a court order differently, and compromise that user's privacy" and "[...]if a court order has been issued by the Supreme Court of British Columbia compelling us to reveal the content of your encrypted email, the "attacker" could be Hush Communications, the actual service provider."[16]

See also

[edit]

References

[edit]
  1. ^ Geist, Michael (2007-11-27). "Private E-mail Not Hush Hush". The Tyee. Archived from the original on 2020-01-02. Retrieved 2019-11-27.
  2. ^ Sutherland, Richard (17 November 2020). "Hushmail secure email review". TechRadar. Retrieved 2023-08-31.
  3. ^ "Hushmail for Personal Use". www.hushmail.com. Retrieved 2024-08-29.
  4. ^ "Hushmail for Healthcare". www.hushmail.com. Retrieved 2024-08-29.
  5. ^ "Hushmail for Small Business". www.hushmail.com. Retrieved 2024-08-29.
  6. ^ "Hushmail for Law". www.hushmail.com. Retrieved 2024-08-29.
  7. ^ "– Two-Step Verification". Archived from the original on 2014-06-25. Retrieved 2014-06-11.
  8. ^ "Hushmail for Healthcare - HIPAA Compliant Encrypted Email, Web Forms & E-Signatures". hushmail.com. Retrieved 21 July 2022.
  9. ^ "Hushmail closes IM service". Archived from the original on 2013-10-27. Retrieved 2012-07-20.
  10. ^ "Alternative Web Mail Review – Hushmail Premium, PC Magazine". Archived from the original on 2009-04-14. Retrieved 2017-08-31.
  11. ^ E-Mail Encryption Rare in Everyday Use: NPR
  12. ^ a b c Encrypted E-Mail Company Hushmail Spills to Feds |Threat Level via Wired.com
  13. ^ a b c Hushmail Privacy via Wired.com Archived 2007-11-10 at the Wayback Machine
  14. ^ bakersfield.com Archived 2008-07-24 at the Wayback Machine
  15. ^ "Hushmail.com Privacy Policy". Hushmail.com. Archived from the original on 2001-02-15.
  16. ^ Hushmail – Free Email with Privacy – About Archived 2007-11-22 at the Wayback Machine
[edit]