Email is an open system, right? Anyone can send a message to anyone… unless they are on Gmail! School Interviews uses two email servers t…

    • sab@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      Proton is end-to-end encrypted - they don’t have the keys themselves. With TLS, encryption is between you and the server, but the information can be decrypted on the server side.

      At least that’s my understanding of it. If you want Proton’s own words, they wrote an explanation on their website. :)

    • dorkian-gray@kbin.social
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      They’re not using a different protocol for delivery, they still use IMAP and SMTP, but other mail clients can’t decrypt the message content from Proton because they don’t have the keys (and nor do Proton). Proton do supply a “bridge” app if you want to use your Proton mail with a desktop email client, which handles the decryption between your computer and Proton by accessing the Proton encryption keys on your computer.

      TLS is like a padlock on a box, and you have the key. Encrypted content is if the letter in the box is also written in code, needing another key to translate into plain language.

      • pjhenry1216@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        Proton doesn’t use IMAP. Your inbox isn’t quite like other internet mailboxes. You can’t access it with TLS. You access it via normal TCP/IP traffic. The contents are encrypted and can only be decrypted on your device. This is why IMAP doesn’t work. The Bridge acts as a Proton client, decrypts the data and then acts as a local IMAP server so you can connect to it via another IMAP client. Proton cannot read your email at any other time other than ephemerally at the moment it receives the email, which it then encrypts one way into your inbox. It cannot decrypt it. Only your devices can. Your devices get the private key from Proton’s servers, but they’re encrypted with your account password. So you grab the encrypted key and decrypt it locally on your device. It’s not the most secure, but it’s the most secure you can do without having to manage your own keys. It should be noted that you can possibly lose access to your email. This would require losing access to your physical devices and losing your password at the same time. As long as you have a device that has your key, you can restore access to your account which allows it to update the encryption on the key, etc. If you lose your physical devices and lose your password, you can only restore access to your account, but not any of your email up until that point.