Encrypted email service protects users

By | October 16, 2006

Primum Group Technologies has announced today that TrustedPear, its encrypted email service, protects users’ secrets and identities on the Internet with several unique mechanisms.

TrustedPear cannot be spammed, and cannot spam. Typically, spammers and phishers exploit a person’s email address, or a block of addresses from certain Internet service providers. TrustedPear™ doesn’t use public email addresses. Thus, no phishing exploit can be sent to a TrustedPear™ user.

TrustedPear users exchange a one-time-use four-character “PearCode™” instead of an email address. Use of this PearCode™ sets up the secret link between the two users. Once the first message is sent, the two users keep writing secretly to each other. No third-party can ever “break into” the communications link between the first two persons—not an ISP, not a system’s administrator, not a boss.

TrustedPear’s encrypted messages cannot be traced back to the sender. All other email systems use email “headers” and routing information. TrustedPear™ doesn’t use headers. There is nothing to trace. This protects users’ identities. The recipient only knows that they have a TrustedPear™ message from someone who is trusted. They might know who they are writing to, or they might not.

TrustedPear data is always encrypted. Users’ secret information is encrypted while the data rests on TrustedPear™ servers, and while it is “in transit” from the user to the server. Only when the user is actually reading a message is it ever “in the clear.”

TrustedPear messages do not have a typical “encrypted signal” on the Internet. Thus, users’ messages cannot be intercepted by anyone searching for encrypted data traffic. All other encrypted email systems are obviously encrypted, making easy for someone to identify who is using encryption and who is not. This makes TrustedPear™ “boss-proof,” for those who wish to send messages from work.

TrustedPear also does not leave your data on a public Internet site. Users who access their encrypted messages at libraries or kiosks, e.g., keep their identity secret because TrustedPear™ only uses RAM or “volatile” memory.” When the TrustedPear™ window is closed, all data evaporates. This means that a user’s secret data is never left on the public computer.

Leave a Reply