In the aftermath of Edward Snowdens leak of NSA information, developers from far and beyond have been working around the clock to build an NSA proof email. Because of the NSA’s massive data collection service which is implemented on major US based companies, creating such an email service is not tedious, but very difficult.
Although to some this idea of secure, NSA-proof email may seem new, it has been a reality for HushMail and Lavabit, who were known by many people in high places of their service quality, and not to mention their service. This allowed many high profile people communicate without the worry of having their conversations observed. Unfortunately, due to government stress, the canadian based Hushmail was forced in 2007 to subvert its own security. Six years later, Lavabit management made the decision to completely whipe out their email service, deleting all traces of user emails due to concerns of privacy due to the US government. The next day after this happened, another secure email company followed in Lavabits footsteps and shut down its’ email service as well due to the same reasons.
In this time and day, the need for secure email is rising higher and higher, yet the light at the end of the tunnel seems to be getting smaller…until now. Kim Dotcom, the man behind the MegaUpload scandal, recently announced that he will be starting a similar email service to HushMail and Lavabit, not to mention continuing work on his new website Mega.co.nz, the successor of MegaUpload. On top of this, a project called Mailpile just raised more than $100,000 on the crowdfunding site IndieGoGo to fund a web-based, encrypted email client.
With these two services currently in the making. the only service still fully accepted and available, is Scramble. Scramble is an encrypted webmail software coded by recent Stanford University computer science graduate Daniel Posch.s still in the “proof of concept” phase. He released it last week on theLiberationtech message board and he wants his peers to review the code and the concept. “I’m putting it out there as open source, trying to get people interested,” he said. “For it to be foolproof, you need peer review by other security engineers.”