Technical Product Information goldenMail Private and Secure E-mail Service E-mails and attachments are digitized using asymmetric encryption keys, which are different for the sender and the recipient. The encryption principle applied involves the use of pairs of public and private keys. This principle can be explained by reference to the following example: • • • • I send an open padlock to a person who wishes to send me confidential documents. The padlock represents the public key. My correspondent puts these documents into a suitcase (the suitcase represents the E-mail system). My correspondent secures the suitcase with the padlock, which they close. Once the suitcase is closed, only I can open it, as I have the key to the padlock (which represents the private key). The E-mail program, Thunderbird, is itself installed on an encrypted USB key, one copy of which is in the possession of the E-mail sender, while a second encrypted USB key is in the possession of the E-mail recipient. Installation of the encrypted USB key by the sender and receiver: The encrypted USB key is inserted into the computer. The entry of the password for the key will be requested. A self-destruct mechanism will delete the contents of the USB key after 10 successive incorrect password entries. The USB key will then be unlocked, and the sender will be able to launch Thunderbird. Use of goldenMail on the sender side Thunderbird is launched. The sender cannot simultaneously use their non-encrypted E-mail program and the encrypted Thunderbird program. If necessary, installation on a separate computer terminal may permit this simultaneous use, but this may be an expensive option. The sender writes their E-mail, attaches the required documents and sends the E-mail to the recipient, who must be in possession of an encrypted GM USB key. Use of goldenMail on the recipient side Thunderbird is launched. The recipient cannot simultaneously use their non-encrypted E-mail program and the encrypted Thunderbird program. If necessary, installation on a separate computer terminal may permit this simultaneous use, but this may be an expensive option. The recipient viewing E-mails received will only see illegible inscriptions. If they wish to view an Email received, the recipient must enter their “secure phrase”, which will permit the decryption of the E-mail using their own private key. This provides a second level of security. E-mails received will be loaded onto the USB key, and will remain encrypted. The recipient may decide to erase them (they will be erased as well on goldenTech's servers) or to transfer them on his own computer, as well on his non-encrypted E-mail program. The contents of the present document relate to a goldenTech product. Any partial reproduction or use thereof, for whatever purposes, without the consent of the author shall give rise to action at law. Page 1/2 Except in case of deliberate action by the sender or the recipient, no information will be written onto the hard disk of the computer. All data are carried on the encrypted USB key and the goldenTech secure servers. E-mails will be read using the IMAP protocol, which allows E-mails and attachments to be consulted from any location, with no requirement for the saving thereof on the computer of the sender or the recipient. All E-mails will remain on the goldenTech secure servers and on the USB key. During each connection the IMAP protocol will export what is on the goldenTech secure servers onto the encrypted USB key. If a user (sender or recipient) decides to delete an E-mail from the USB key, this E-mail will also be permanently deleted from the goldenTech secure servers. goldenTech does not have the facility for the reading of E-mails saved on its own secure servers. When an E-mail is sent, the E-mail program on each USB key will encrypt the E-mail concerned and its attachments, using the public key of the recipient. Upon the inclusion of a new user in a given group • the public key of the new entrant will be notified to members of the closed group. • existing members will incorporate this new public key into their key administrator (included in the encrypted Thunderbird program on the encrypted USB key). • the new user will then be recognized as a member of the closed group. Powered by ______________________________________________________________________________ The contents of the present document relate to a goldenTech product. Any partial reproduction or use thereof, for whatever purposes, without the consent of the author shall give rise to action at law. Page 2/2
© Copyright 2024