Dark Mail Technical Alliance wants to encrypt your mails against the NSA

To prevent government agencies or malicious users can intercept and read mails, founder of Lavabit and Phil Zimmermann, PGP designer, joined in the Dark Mail Technical Alliance.

See This : Ubuntu 14.10 beta Utopic Unicorn now available

Rather than having to provide access to its secure mail service, Lavabit, Ladar Levison has preferred to close mid-year 2013. Shop However, the man did not give up, as evidenced by its participation in the foundation the Dark Mail Technical Alliance. A structure that is intended to allow the encryption of messages from end to end, to prevent their being read by unauthorized persons.



Two new protocols

But Ladar Levison is not alone in this quest, he is accompanied by Mike Janke Silent Circle, which specializes in encrypted communications -qu'on found behind the Phone- Black, Jon Callas, co-founder of PGP Corporation and finally Phil Zimmermann, PGP designer. 
The four men working on a project called DIME, Dark Internet Mail Environment, whose primary purpose is to "simplify the adoption of a secure mail system" . It will be manifested by two protocols, PTMI to Dark Mail Transfer Protocol, and DMAP to Dark Mail Access Protocol, which will therefore replace the SMTP and IMAP, conventional protocols for sending and receiving emails. Unlike their ancestors, and DMAP PTMI are designed to encrypt default exchanged mails.


Multiply layers and limit access

In fact, they are thought to apply multiple encryption layers to ensure that the various stakeholders in the path of an email can not access information that their tasks require. DIME also intends to "reduce the possibility of interception by unauthorized users" . Thus, only the sender and the recipient can read the email in its entirety. The author's email server can decrypt such that part of the message that contains the name of the recipient's email server. Thus, in the mail sending operation schematically contains four stages, each element knows only those before and after him, except for the sender and the recipient, of course.

To successfully protect trade within the chain of communication, "the messages have a tree structure, with encryption of the content by" leaf ". Each element has its own private and public keys. This obviously implies a management system "federated" key and also limits the resource requirements and bandwidth to handle mail. Keys must be validated by a certification authority to be declared confidence, which should prevent frauds.

A long road ...

Better yet, the project specifications provide a "way of confidence." It allows a DIME server to generate keys for a user whose mail client is not compatible with DIME. Thus, the message is encrypted automatically. A temporary solution until the protocol is adopted massively. 
And just to get there, Ladar Levison wants to start broadcasting protocol specifications among members of the IETF, which could lead to the ratification of DIME as standard and its integration with tools such as Postfix, free mail server, which opened the doors to the Net DIME. 
For now, DIME takes the form of a directory on GitHub, which contains the pre-alpha bookstores Dark Future Mail. The curious can also read 109 pages of specifications. It is indeed not possible at this time to deploy and use this project.

Previous Post Next Post