goldenMail

Technical Product Information
goldenMail
Private and Secure E-mail Service
E-mails and attachments are digitized using asymmetric encryption keys, which are different for the
sender and the recipient.
The encryption principle applied involves the use of pairs of public and private keys. This principle
can be explained by reference to the following example:
•
•
•
•
I send an open padlock to a person who wishes to send me confidential documents. The
padlock represents the public key.
My correspondent puts these documents into a suitcase (the suitcase represents the E-mail
system).
My correspondent secures the suitcase with the padlock, which they close.
Once the suitcase is closed, only I can open it, as I have the key to the padlock (which
represents the private key).
The E-mail program, Thunderbird, is itself installed on an encrypted USB key, one copy of which is
in the possession of the E-mail sender, while a second encrypted USB key is in the possession of
the E-mail recipient.
Installation of the encrypted USB key by the sender and receiver:
The encrypted USB key is inserted into the computer.
The entry of the password for the key will be requested. A self-destruct mechanism will delete the
contents of the USB key after 10 successive incorrect password entries.
The USB key will then be unlocked, and the sender will be able to launch Thunderbird.
Use of goldenMail on the sender side
Thunderbird is launched. The sender cannot simultaneously use their non-encrypted E-mail
program and the encrypted Thunderbird program. If necessary, installation on a separate computer
terminal may permit this simultaneous use, but this may be an expensive option.
The sender writes their E-mail, attaches the required documents and sends the E-mail to the
recipient, who must be in possession of an encrypted GM USB key.
Use of goldenMail on the recipient side
Thunderbird is launched. The recipient cannot simultaneously use their non-encrypted E-mail
program and the encrypted Thunderbird program. If necessary, installation on a separate computer
terminal may permit this simultaneous use, but this may be an expensive option.
The recipient viewing E-mails received will only see illegible inscriptions. If they wish to view an Email received, the recipient must enter their “secure phrase”, which will permit the decryption of the
E-mail using their own private key. This provides a second level of security.
E-mails received will be loaded onto the USB key, and will remain encrypted. The recipient may
decide to erase them (they will be erased as well on goldenTech's servers) or to transfer them on
his own computer, as well on his non-encrypted E-mail program.
The contents of the present document relate to a goldenTech product. Any partial reproduction or use thereof, for whatever purposes,
without the consent of the author shall give rise to action at law.
Page 1/2
Except in case of deliberate action by the sender or the recipient, no information will be written
onto the hard disk of the computer. All data are carried on the encrypted USB key and the
goldenTech secure servers.
E-mails will be read using the IMAP protocol, which allows E-mails and attachments to be
consulted from any location, with no requirement for the saving thereof on the computer of the
sender or the recipient.
All E-mails will remain on the goldenTech secure servers and on the USB key. During each
connection the IMAP protocol will export what is on the goldenTech secure servers onto the
encrypted USB key.
If a user (sender or recipient) decides to delete an E-mail from the USB key, this E-mail will also be
permanently deleted from the goldenTech secure servers.
goldenTech does not have the facility for the reading of E-mails saved on its own secure servers.
When an E-mail is sent, the E-mail program on each USB key will encrypt the E-mail concerned
and its attachments, using the public key of the recipient.
Upon the inclusion of a new user in a given group
• the public key of the new entrant will be notified to members of the closed group.
• existing members will incorporate this new public key into their key administrator (included
in the encrypted Thunderbird program on the encrypted USB key).
• the new user will then be recognized as a member of the closed group.
Powered by
______________________________________________________________________________
The contents of the present document relate to a goldenTech product. Any partial reproduction or use thereof, for whatever purposes,
without the consent of the author shall give rise to action at law.
Page 2/2