Introducing EasyCrypt – perfect email privacy service

EasyCrypt - Perfect Email Privacy

Readers of Part 1: Introduction to our Email Privacy Crash Course and of its conclusive Part 6: Make your choice know that with the existing email privacy solutions users need to compromise on more than one of the following key aspects of email privacy:

  • Strong end-to-end encryption
  • Protection of metadata
  • Anonymity
  • Usability
  • People network (ability to communicate securely with many people)
  • Ubiquity (ability communicate privately while using any email service)


We are now announcing EasyCrypt – the first email privacy solution that requires no compromises.



EasyCrypt is the first email privacy service  that combines end-to-end encryption, anonymity and metadata protection at your existing email address.  Featuring modern, intuitive webmail and mobile apps, EasyCrypt allows users to use email just like they normally do.

EasyCrypt  subscribers continue to use their current email service and address, be it Gmail, work mail or any other email service. Email messages are stored at their existing mailboxes, encrypted end-to-end with 4096-bit PGP. EasyCrypt has zero knowledge of message content: the messages can be decrypted only on user devices using passwords  known only to the users. Encryption keys are generated, managed and  synchronized across the user’s fixed and mobile devices transparently for the user.

EasyCrypt users can communicate securely with external PGP users as well as with regular users. External PGP users are enabled by emailing their public key to EasyCrypt and following a simple automated verification procedure.

To protect email metadata and enable user anonymity, EasyCrypt makes innovative, user-transparent use of the Tor network. Personally identifiable metadata of email senders such as their IP address, email address and computer ID is either encrypted on the sender’s device so that it can be read only by the recipients, or suppressed if it is not needed. Email metadata is protected end-to-end and cannot be accessed by EasyCrypt or 3rd parties.

Email messages delivered via EasyCrypt are stored in the usual mailbox of the user, such as Gmail or enterprise email server.  By inspecting mailboxes of an EasyCrypt user intruders will be able to learn only the user’s email address and the sizes of the messages. All other message data and metadata will be unreadable.

EasyCrypt users can opt to communicate anonymously, hiding their identity from message recipients and intruders. EasyCrypt does not know who are the authors of the messages  sent through the service.

The following table compares EasyCrypt with a representative sample of existing email privacy solutions and services:


EasyCrypt is slated for beta release in late 2016. To learn more, please visit EasyCrypt website.


Comments are closed.

Send this to a friend