ne2hhr.xyz

What is this?

The premise is simple: A sufficiently secure, encrypted mail service that is not proprietary and still allows interoperability with standard protocols and software.

How does it work?

It was designed with 3 primary goals in mind:

What features does it have?

As a service must be useful, all the expected features are supported:

Additionally, relay only is supported, using your own smtp/lmtp destination: Things we would like to support at some point in the future, if it can be done reliably and in a privacy-conscious manner: Things that are not supported and will not be supported:

How much does it cost?

While benevolence is nice, it is not sustainable. Nothing is free to run or maintain, as of yet final pricing has not been determined, but it will be in the range of $5 per month per 1GB of storage. Custom domains, aliases, filtering etc, are for the moment, free of charge. As the service is developed and refined, pricing may change. Pricing will be grandfathered in (or reduced as appropriate) for existing subscriptions.

What payment methods do you accept?

Cryptocurrency (currently: BTC & Monero) is the preferred method of payment, inline with the privacy principles, however, credit cards and wire transfers will also be accepted upon request.

What jurisdictions are you under?

That is a tricky question to answer. While the infrastructure is owned and operated by USA and European domiciled entities, the data stores may not be. It remains to be seen how this will be approached legally.

How about some more technical information?

Architecture

Backends:

Internet-facing: These servers are essentially just proxies, they do not store any data, they simply route your connections to the appropriate backend based on the mailbox region and handle encryption and decryption of the data in transit. They are also responsible for accepting incoming mail and routing it to the appropriate backend. They store no logs and have only minimal information required to get the connections to the correct place. The same security and encryption techniques are applied, additionally they have no input, consoles or management access whatsoever. Unavailability results in destruction.