News and Articles
In today’s world of identity thieves, cybercriminals, hackers, snooping journalists, unethical business rivals and ever-more invasive government agencies in places where we live or travel, the consequences of not securing and protecting our email are becoming ever more serious. These major news stories and articles illustrate how real the threats are and – in some cases – how unpleasant the consequences turn out. We then explain how MailTight addresses these types of threats to safeguard your email and privacy.
May 2014
French telecommunications giant Orange SA revealed hackers stole data about 1.3 million customers in an attack last month, the latest in a series of cyberattacks on companies. Orange said hackers stole personal information such as names, telephone numbers and email addresses for clients or potential customers in the attack, the second cyberassault on the company this year.
Many large Internet and communications companies developed their systems at a time when security threats were much less sophisticated and a far lower priority. Many now struggle to keep up with advances in security. This leaves their systems vulnerable, often with outdated security infrastructure. MailTight is totally focused on maintaining your security and privacy and is constantly working to stay far ahead of any new threats.
April 2014
Google has clarified its email scanning practices in a ‘terms of service’ update, informing users that its systems scan the content of emails stored on Google’s servers, as well as those being sent and received by any Google email account, to deliver tailored advertising. The practice has seen the search company face criticism from privacy action groups and lawsuits from the education sector.
MailTight will never analyse the content of your email to deliver any form of advertising or for any other marketing purpose. MailTight’s antispam and antivirus servers only perform highly specific scans of messages to protect all users against viruses, trojans and spam.
A major hack of AOL Mail resulted in users' accounts being compromised to send out spam messages. AOL confirmed in a company blog post that "there was unauthorized access to information regarding a significant number of user accounts”. Spammers used the information to send "spoofed" emails – messages that appear to be from a valid address or trusted contact, but are not actually from those contacts – from about 2% of all AOL Mail accounts, the company said.
Many large Internet companies have failed consistently to keep their security capabilities up-to-date. AOL is one of several large email service providers that still fail to support well-established secure web standards, such as TLS 1.2 or Forward Secrecy, even weeks after being hacked. MailTight always proritises keeping its security strong and up-to-date.
Heartbleed, the massive flaw in web encryption recently made public, is just one of the unending stream of vulnerabilities that enables hackers to steal personal details and passwords from companies with which you do business. A number of websites have launched recently to help users learn if any of their accounts have been hacked.
MailTight keeps up-to-date constantly with the latest improvements in security, as well as monitoring new techniques used by hackers to target accounts. By doing this, MailTight is always at the front of the pack in terms of protecting you. Independent tests by companies such as Qualys show that very few Internet companies do an effective job of security.
A new industry report published by Mandiant/FireEye says that the Chinese government has expanded the scope of its cyber espionage despite the greater public scrutiny these operations received in 2013. The same company in February 2013 published the much discussed APT1 report directly linking a Chinese army unit to a massive cyber espionage campaign against foreign businesses. Executive emails are among the priority data hackers are targeting.
Governments of many countries operate cyber spying programmes that target foreign businesses, both to steal trade secrets and also to gain commercial advantage either directly or to assist domestic businesses. MailTight’s enhanced security helps you protect your business information, both when you travel and at home.
March 2014
Microsoft is caught up in a privacy storm after admitting it read the Hotmail inbox of a blogger while pursuing a software leak investigation. Microsoft owns Hotmail, an email service now called Outlook.com. The revelations have left Microsoft in a difficult position, as the firm has often criticised rival Google for its automatic scanning of users' emails in order to serve them with advertising.
All email on MailTight’s servers is encrypted and the system’s security architecture, key management processes and policies mean user emails will not read by the company. Furthermore, MailTight is not an advertiser-funded service, so will never compromise privacy to generate advertising revenue.
February 2014
Several email accounts owned by members of the Bush family or their close friends have been hacked. Personal details including private photographs, email addresses, phone numbers and mailing addresses for multiple members of the Bush family were stolen.
MailTight makes hacking of personal or business accounts ever more difficult by constantly improving security measures that prevent the use of new techniques used by hackers. Even highly effective measures used by MailTight, such as preventing the use of passwords known to hackers, are not used by many email providers.
Cybersecurity firm Hold Security says that it has uncovered stolen credentials from some 360 million accounts that are available for sale on cyber black markets. The discovery could open the door to online bank accounts, corporate networks, health records and virtually any other type of computer system. The massive trove of credentials includes user names, which are typically email addresses, and passwords that in most cases are in unencrypted text.
In spite of numerous Internet companies being hacked and having user passwords stolen, many still place a low priority on implementing strong security. MailTight always places security and privacy as its highest priorities to protect your personal or business data.
More than 2 million consumer complaints were filed with the US Federal Trade Commission in 2013, with identity theft topping the list. 290,056 reports of the crime were collected by the agency, representing 14% of total complaints. People aged 50 to 59 had the most fraud complaints, with identity theft hitting people in their 20s the most often.
Many people significantly underestimate the prevalence of cybercrime and identity theft. By using MailTight, you can significantly improve the protection of your important personal or business information due to better security and privacy.
January 2014
Usernames and passwords of some of Yahoo's email customers have been stolen and used to gather personal information about people those Yahoo mail users corresponded with, the company revealed. Yahoo did not say how many accounts were affected. Yahoo is the second-largest email service worldwide, after Google's Gmail, according to the research firm comScore. There are 273 million Yahoo mail accounts worldwide, including 81 million in the US.
Large high-profile email service providers are the most attractive target for hackers, due to the vast number of accounts and identity information the hackers can gain access to. In addition to being entirely focused on security and privacy, MailTight keeps a low profile to protect its users even further.
Passwords and other details of 16 million email users in Germany have been stolen, the country's security agency has revealed. The Federal Office for Security said criminals had infected computers with software which allowed them to gather email addresses and account passwords.
MailTight goes far beyond other email service providers in monitoring lists of millions of passwords circulated by hackers to ensure those passwords cannot be used in future on the MailTight service. Users also need to take precautions, such as using up-to-date anti-virus software and not clicking on unknown web links, to ensure malicious software does not infect their systems.
December 2013
For all their indignation when the scope of the NSA’s mass data collection became public, French intelligence services operate similar mass surveillance, with minimal oversight. Last week, with little public debate, the legislature approved a law that critics fear will markedly expand electronic surveillance of French residents and businesses. The law provides for no judicial oversight and allows electronic surveillance for a broad range of purposes, including “national security,” the protection of France’s “scientific and economic potential” and prevention of “terrorism” or “criminality.” French intelligence services are already reputed to be rapacious collectors of foreign industrial secrets.
MailTight’s operates no subsidiaries or servers in countries whose laws or regulations require backdoor access to user data. Both local and foreign businesses operating in these countries can avoid unauthorised access to their data by using MailTight servers based in a secure location outside of their home country.
More than two million stolen passwords used for sites such as Facebook, Google and Yahoo and other web services have been posted online. The details were probably uploaded by a criminal gang, security experts said. A security researcher noted that 30-40% of people use the same passwords on different websites, often simple passwords such as “123456”.
MailTight enforces the use of strong and complex passwords to ensure users’ accounts are far less vulnerable to attack when passwords are stolen from Internet companies with inadequate security. MailTight checks all new user passwords against vast internal databases of passwords known to be used by hackers to ensure they are not used willingly or inadvertently.
November 2013
Nearly 150 million people have been affected by a loss of customer data by Adobe, over 20 times more than the company admitted initially. As well as allowing the data to be stolen in the first place, Adobe made two other serious errors when storing the data. Firstly, it encrypted all the passwords with the same key; secondly, the encryption used a method which renders the encrypted data insecure. An independent tool is available to check if your password was leaked.
Adobe is one of many major technology companies that have demonstrated remarkably poor protection of the security and privacy of customer information, by making rudimentary security errors. MailTight places security and confidentiality at its core and uses state-of-the-art methods to encrypt and maintain security of all user data, such as always encoding passwords using salted CPU-intensive hashes.
Phil McKenna’s personal information was stolen by a professional identity thief. He investigated and found security breaches at companies holding his personal data were the most likely culprit. Each year 13 million Americans, or 5% of the adult population, are victims of identity theft. Fraudulent transactions, including credit card purchses, opening new lines of credit and wiring money from bank accounts, cost financial institutions and individuals more than $20 billion each year, according to a recent study by Javelin Strategy & Research.
MailTight allows you to protect your identity and personal or business information from one of the main sources where identity information is stolen. Email contains more and more sensitive information: you owe it to yourself to protect it.
October 2013
The National Security Agency harvests hundreds of millions of contact lists from email and instant messaging accounts around the world. The collection program intercepts email address books and “buddy lists” as they move across global data links. During one typical day, the NSA’s Special Source Operations branch collected 444,743 email address books from Yahoo, 105,068 from Hotmail and 33,697 from Gmail. The typical daily intake corresponds to more than 250 million a year.
All connections from your devices to MailTight servers and between MailTight servers are encrypted using strong encryption and forward secrecy, which remain effective even where unwelcome parties intercept internet data in transit.
September 2013
Pew Research conducted interviews underwritten by Carnegie Mellon University on Americans’ experiences with anonymity, privacy and security online. Findings included that 21% of internet users have had email or social networking accounts compromised or taken over without permission and 11% have had important personal information stolen such as their Social Security Number, credit card or bank account information, with 6% actually losing money.
MailTight has had security and privacy designed into it from day one, removing weaknesses that are exploited by hackers and cybercriminals to compromise or take over most email accounts.
August 2013
Texas-based encrypted email service Lavabit announced it was shutting itself down in order to avoid complying with what it considered unjust secret US court orders to provide government access to user content. Silent Circle, another US-based service, founded by internet security guru Phil Zimmerman, followed suit by shutting its own encrypted email service. The growing and accurate perception that most US-based companies are not to be trusted with the privacy of electronic communications poses a real threat to those companies' interests.
Although recent revelations have highlighted the lack of privacy for business or personal data hosted by US-based companies, many other countries – including the European Union – also require data retention and/or installation of ”back doors” by service providers. MailTight operates only in countries that offer a far higher level of respect for privacy, both in law and practice.
Google has made it clear that people who send or receive email via Gmail should not expect their messages to remain private. Public interest group Consumer Watchdog called the statement a "stunning admission" and warned people who cared about their privacy not to use Google's email service.
Every business chooses which products or services to sell to satisfy the needs of its customers or clients. Google’s primary business is to sell advertising. For many users, choosing an email service subsidised by advertisers in exchange for loss of privacy may be an acceptable choice. MailTight’s business model is to sell a business-class email service for those who value privacy and security.
Lavabit is no more. Silent Circle has shuttered its secure email service. All the major email providers appear to be complicit in one form or another with PRISM, the NSA’s clandestine email surveillance program revealed in early June. Now Google’s legal team is arguing that users who access Google services like Gmail should not expect their transactions to remain secret.
The success of email is built on open standards, allowing messages to be exchanged between a vast number of different networks and services. Not all networks are created equal: each has its own priorities – MailTight is rare in focusing on privacy and security. Although MailTight allows you to communicate with users of all email networks, you should ensure your correspondents also use MailTight to be assured of effective privacy and security.
Combating cybercrime is an uphill struggle, with the tools needed to commit technological crimes becoming more readily and cheaply available. According to data collated by analysts including the United Nations Office on Drugs and Crime, cybercrime is worth about US$400 billion annually. Cybercrime ranges from mining and exploiting personal data, including fraud, to industrial and state-sponsored espionage. Smaller companies are increasingly the target as larger companies do a better job of protecting themselves.
MailTight allows small and medium-sized businesses – as well as individuals – to enjoy the same or higher level of protection than that available to larger security-oriented companies who invest significantly in the specialist skills and infrastructure required to implement effective security and privacy. MailTight provides a high level of protection against competitors, cybercriminals, foreign governments or employees reading your email and exploiting your confidential information.
July 2013
There is no need to surrender your privacy online. Free email, social networking and other digital services are only provided in return for volunteering personal information. Third parties – from government agencies to cybercriminals – can often get their hands on more information. Properly implemented strong encryption is something you can rely on to keep your information more secure.
MailTight enforces strong and properly implemented SSL/TLS (encrypted connections) for all web browser and email device-to-server links. All user related data is also stored encrypted on MailTight’s servers.
Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption on Outlook.com and Hotmail. Files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years.
MailTight’s legal and operational infrastructure is based only in countries that respect your privacy. MailTight does not operate in any country that would require it to build backdoors into its network or systems or retain your communications data.
Top secret documents detail the massive scope of efforts by the US to spy on Europe. Each month, the US saves data from around half a billion communications connections from Germany alone. There are alliances with over 80 major global corporations supporting monitoring networks abroad.
Europe also has its own interception infrastructure and regulations, including the EU Data Retention Directive. MailTight encrypts all private data and “metadata” and operates only in countries that respect your online privacy.
A New York court has granted oil giant Chevron subpoena access to "more than 100 email accounts, including environmental activists, journalists, and attorneys" involved in a long-running dispute in Ecuador, according to the Electronic Frontier Foundation (EFF). None of the individuals represented by EFF has been sued by Chevron or accused of wrongdoing.
MailTight’s legal and encryption structures mean that such a legal case would be unsuccessful in obtaining access to the content of any MailTight email accounts.
June 2013
You will not always know when you have something to hide because you have almost zero chance of ever knowing the vast number of laws and regulations that apply to you. If authorities have access to all your communications, it is almost certain they could find something you have done that violates some law or regulation. Authorities already abuse their powers, but if everyone’s action is monitored and everyone violates an obscure law at some point, then punishment becomes purely selective. Those with power will have what they need to punish anyone they like, whenever they choose. That is the same as no rules.
MailTight’s legal and technical structure is designed to allow you to decide who has access to your information and communications. There are many people who law-abiding individuals and businesspeople want to hide private information from: cybercriminals, hackers, fraudsters, extortionists and competitors, among others.
The American intelligence director and White House have finally confirmed what insiders have long known: the Obama administration is spying on the entire world. Former NSA employees Thomas Drake and Bill Binney explained that facilities can store personal data on people from all over the world and keep it for decades. This includes emails, Skype conversations, Google searches, YouTube videos, Facebook posts, bank transfers – electronic data of every kind.
The only protection against wholesale capture and storage of communications over the Internet by many countries is properly implemented strong encryption that will remain secure decades into the future. MailTight uses strong encryption using long RSA keys and AES. It also includes tools to prevent users choosing billions of weak passwords.
The top-secret PRISM program allows the US intelligence community and its partners to gain access to a wide range of digital information from American Internet companies, including emails and stored data. The documents show how the program interacts with major Internet companies, including Microsoft, Google, Yahoo, Apple, Facebook, Skype and AOL.
MailTight’s legal and operational infrastructure (companies, mail servers, etc) is based only in countries that respect your privacy. MailTight does not operate in any countries that compel – often secretly – Internet or communications companies to build backdoors into their networks or systems.
May 2013
A Hong Kong businessman’s email account was hacked and a bogus message was sent to his accountant, purportedly from the director, instructing him to transfer US$90,000 to another company’s account. The businessman has initiated legal proceedings to try and recover his funds.
The consequences of having your email account hacked are no longer just inconvenience and loss of privacy. Email is increasingly used for important financial and business transactions. MailTight uses multiple security layers, such as screening for use of passwords contained in vast hacker dictionaries, and other techniques to ensure your account is kept more secure.
April 2013
Police forces across the UK are routinely snooping on people's email and phone call details, a major survey has found. The survey using Freedom of Information laws found that 25 police forces made 506,720 requests for people’s email and phone records over the past three years, with the number of requests increasing significantly each year. Merseyside made the most requests, with 36 requests for every 1,000 residents living in the county.
These statistics are publicly available in the UK, where freedom of information laws allow disclosure. In many countries with less trustworthy police and legal processes, this type of extensive spying on private communications is even more invasive and potentially damaging. MailTight protects against it by encrypting all communications from your email device and storing your encrypted data in privacy-oriented countries not subject to snooping or access by such authorities or adversaries.
IRS files obtained by the American Civil Liberties Union reveal the tax collection agency believes it can read American citizens' emails without a warrant. As long as you've stored your email in a cloud service like Google Mail and those emails haven't been deleted after a few months, the agency thinks it doesn't need a warrant to read them. The Electronic Communications Privacy Act of 1986 allows government agencies to obtain emails older than 180 days without a warrant.
By storing all messages encrypted and in privacy-oriented countries such as Hong Kong, MailTight keeps you in control of your emails and data, with no back-door access.
March 2013
Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has difficultly in monitoring Gmail, Skype, and Dropbox in real time, even though archived emails and data is easily available. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage managed by US companies a “top priority” this year.
MailTight’s operating companies and infrastructure are based solely in privacy-oriented countries where laws and regulations allow MailTight to fully protect the security and privacy of emails and data.
Security Week – Journalists Without Borders: Syria, China, Iran, Bahrain are worst for online spying
Syria, China, Iran, Bahrain and Vietnam are flagrantly spying online, media watchdog RSF (Journalists without Borders) reported, urging controls on the export of Internet surveillance tools to regimes clamping down on dissent. A new report entitled "Enemies of the Internet" also singled out five companies -- Gamma, Trovicor, Hacking Team, Amesys and Blue Coat -- that it branded "digital era mercenaries," who were helping oppressive governments.
MailTight only accepts encrypted connections to its servers to ensure that your email is safe and not intercepted, which many consider essential when visiting or doing business in the increasing number of countries with pervasive online spying.
February 2013
Microsoft has launched a new print, television and online advertising campaign that attacks Google on an issue that Microsoft believes is one of its great vulnerabilities: privacy. The ads showcase research that shows most people don’t know that web email providers like Google scan the contents of their email messages to deliver personalized ads to them — and when they do find out, they don’t like it.
MailTight provides a secure, professional and private service paid for entirely by subscription fees. Advertiser-funded services either compromise privacy or impose advertising revenue related limits on investment and expense per user. Providing greatly enhanced security and privacy requires additional investment and higher operating cost per user, which is what the MailTight subscription pays for.
January 2013
In the US, the laws applying to email privacy were mainly enacted in 1986, when no-one had any idea how important email would become or how it would be used. In late December 2012, Congress passed amendments to update privacy laws but law enforcement lobbied strongly against the requirement for a search warrant to read stored emails. Although constitutional law provides many protections against government intrusion, there is very weak privacy protection for email.
By basing our operating companies, mail servers and mail storage in privacy-oriented countries, different laws apply to MailTight, which allow your privacy to be protected.
December 2012
Authorities in the US can often obtain your emails and texts by going to Google or AT&T with a simple subpoena. Usually you won’t even be notified. Stored data, such as email drafts and messages older than 180 days, has very few protections.
MailTight operates in privacy-oriented jurisdictions where there are much higher levels of legal protection for private data. In addition, MailTight’s approach to managing encryption keys for all stored data means that even with a court order, MailTight does not hold any unencrypted email messages or access keys to hand over.
The UK government wants the police, intelligence services and other government departments to have access to data relating to web, email and phone traffic. It would allow all communication details collected and stored by ISPs and phone companies to be accessed in near-realtime by UK authorities.
MailTight does not and will not operate any servers or group companies in countries where regulations would require us to provide authorities with backdoor access to email data.
November 2012
If the director of the Central Intelligence Agency couldn’t keep his emails secret, then how can the average American? Privacy experts say people grossly underestimate how transparent their digital communications have become. Among means of protecting yourself, you should be aware of regulations applying to email providers like Google and Yahoo. You should also ensure your messages are encrypted.
MailTight stores all its data encrypted on servers in privacy-oriented jurisdictions that are not subject to legal processes taking place in other countries (e.g. the country of your home or business).
Privacy protections for even the most sophisticated users of consumer email services actually protect very little. With increasing regularity, email and other digital communications have come back to haunt politicians and business leaders. The US and foreign governments now make a regular habit of seeking data about people from Internet giants. Google, one of the few tech companies that discloses details about the requests, said it complied with 90% of requests from US authorities.
MailTight was established with the central objective of protecting your communications security and privacy. Unlike most companies, MailTight’s legal and technical structure was also designed to do so, ensuring that even with a legal order, MailTight does not hold unencrypted email data or the keys for its access.
In the US, law enforcement authorities can easily trace who sent an email. The way that emails are protected is completely outdated when compared to how people communicate today. Law enforcement officials are increasingly asking Web companies to hand over customers’ data by issuing subpoenas, which don’t require a judge’s approval, and companies rarely fight them.
Both MailTight’s data communications AND storage are encrypted using advanced publicly-analysed encryption methods (AES-256, RSA 4096 bit keys, etc), which are considered secure without access to the keys for decades into the foreseeable future. Additional legal, jurisdictional and technical means are used to ensure that MailTight does not have access to the decryption keys, so is unable to hand them over to any third-party.
October 2012
A blogger who sharply criticized Chevron’s actions in Ecuador received a nasty surprise when Google was subpoenaed for information about his email. Google said it intended to comply with the request unless the blogger moved to quash the subpoena. As part of a lawsuit filed by Chevron, subpoenas were sent to Google, Microsoft and Yahoo looking for information about 101 email addresses. Chevron was allegedly seeking nine years of log data.
In the jurisdictions where MailTight operates, a subpoena (or summons) issued in the US, EU, Australia or many other countries would not be enforceable and would be disregarded. In addition, with all email related data held only in encrypted form, there would be no meaningful data available for MailTight to hand over.
July 2012
Yahoo confirmed that approximately 450,000 Yahoo and other company users’ names and passwords were compromised. US security firm Trustedsec said that hackers used the well-established technique of SQL injection to extract the sensitive information from the database. The firm also reported that the most alarming part of the story was that the passwords were stored entirely unencrypted.
MailTight’s servers incorporate protections against SQL injection attacks and encode all passwords using special “salted hash” techniques that prevent reverse lookups of encoded passwords. Many major Internet and telecoms companies still use weak security to protect passwords.
The $32 billion US cybercrime industry has become far more sophisticated. The email hack of today includes our email address and the password that goes with it. At best, some cyber-creep has full access to our private email correspondence. A hacker gaining access to your email account can use information for identity theft or to gain access to financial accounts, as well as for cyber-extortion. Your friends, family and colleagues are also at risk when you are hacked.
MailTight’s core business values are security and privacy so we take them extremely seriously and are constantly working to protect you against anyone who may wish to gain access to your email. Do you want your email hosted by a company whose main business is selling information about you to advertisers?
Fraudsters traded 12 million pieces of personal information online between January and April of 2012. The figure represents a threefold increase on 2010. Credit-checking company Experian said many people were unaware their identity had been stolen until they were refused credit cards or mobile phone contracts. It advised people to make their passwords more complicated so they are harder for fraudsters to crack. Victims of identity fraud also suffered debts run up in their name and being chased by debt collectors for money they did not owe.
MailTight ensures you use a strong password and helps you to do so. When you choose a password, our systems instantly verify that it is not in a list of 600,000+ of the most common passwords or in a “dictionary attack” database of millions of entries used by hackers to break into accounts.
May 2012
The FBI is asking Internet companies not to oppose a controversial proposal that would require firms, including Microsoft, Facebook, Yahoo, and Google, to build in backdoors for government surveillance. The FBI general counsel's office has drafted a proposed law that would require social-networking web sites and providers of VoIP, instant messaging and web email to alter their code to ensure their products are wiretap-friendly.
MailTight operates only in the world’s leading privacy-oriented jurisdictions. Regulations enforced on companies based in countries that require backdoors and data retention (such as the EU’s Data Retention Directive) do not apply to MailTight.
Google’s public version of how it came to secretly intercept data sent on unencrypted Wifi routers over a two-year period doesn’t quite mesh with what the search giant told federal regulators. If Google had its way, the public would have never learned that software on Google’s Street View mapping cars was “intended” to collect payload data from open Wifi networks, according to the Federal Communications Commission. Engineers intended to capture the content of Wifi communications, such as email. Google management said it did not realize it was sniffing packets of data on unsecured networks in about a dozen countries until German privacy authorities began questioning what data its mapping cars were collecting.
MailTight ensures that all data transmitted over Wifi signals is highly encrypted so Wifi sniffing or intercepting your network traffic in a hotel or coffee shop would yield only random data.
April 2012
Sky News has said it illegally hacked emails belonging to members of the public on two separate occasions. Sky News said the action was in the public interest and amounted to “responsible journalism”.
MailTight incorporates many defences against email accounts being hacked into – by journalists or anyone else. These include enforcing strong passwords.
Older News Items
A California judge ordered Google to temporarily deactivate a Gmail account after a bank mistakenly sent sensitive data to the account. The Rocky Mountain Bank of Wyoming sued Google to obtain the account holder’s name after a bank employee erroneously emailed an attachment to the account containing sensitive information on the bank’s customers.
In the jurisdictions where MailTight operates, requests and judgements from foreign judges are not valid or enforceable. A local judicial order would be required, which is subject to local laws.
After the overthrow of Colonel Gadhafi, journalists found a building where former agents spied on emails and chat messages with the help of technology Libya acquired from Amesys, a unit of French technology firm Bull SA. Boeing’s Narus Internet spying division also had meetings with Gadhafi’s agents.
MailTight uses a SwissSign issued SSL certificate (issued by a division of Swiss Post) to prevent server impersonation, along with high levels of encryption, to prevent foreign governments from using tools from companies such as Boeing’s Narus or French company Bull’s Amesys to spy on your email.
The American firm, Narus, now owned by Boeing, supplied Internet interception technology to allow Egypt to spy on Internet users. Narus was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and large corporate clients. Other Narus global customers include the national telecommunications authorities in Pakistan and Saudi Arabia. There are many other companies in the United States that produce and sell similar spying and control technology.
MailTight’s hardened implementation of SSL and use of high level encryption technologies (4096 bit RSA keys, 256 bit AES, etc) allows these interception products and technologies in use by many foreign governments to only capture encoded data which cannot be decrypted by them by any known technology. The encryption standards we implement are considered resistant to attack for decades into the foreseeable future.