Everyone at Beyond Encryption has a wealth of knowledge and experience, helping us to bring world-class solutions to the market.
Find out how our catch-up went with Martin, senior software developer, for a chat about Mailock’s advanced email encryption technology.
We heard Martin explain email encryption and how we maximise it to create the planet's most user-friendly secure email network.
I’m a software developer, which means I get to develop code and design different features, as well as work out how to implement, test, and deploy these in our products.
I’ve worked for Beyond Encryption for six years, with my main projects being the development of the Mailock gateway and the Outlook add-in.
Encryption is basically how you hide or disguise data.
There are two different types of encryption, symmetric and asymmetric, and they both use ‘keys’. Symmetric encryption, the type that Mailock uses, involves both parties using the same key. Asymmetric involves two different keys – a public and a private one.
Encryption can differ according to where it takes place. Transport encryption is when data is encrypted during transit, while encryption can also be in place for when data is at rest.
It all depends on what or who you want to protect your information from. For example, encryption at rest can protect local information stored on your computer hard drive, preventing third parties from accessing it if your equipment was to be stolen.
If I wanted to send and receive something using asymmetric encryption, both parties would have to generate a public and a private key. The private key will be kept either on the desktop or email client, and the public keys will need to be shared between me and my recipient.
Once we have each other’s public keys, we can send encrypted messages and files that can only be decrypted with the private ones. An example of this would be PGP (Pretty Good Privacy).
However, the problem with this method is that you usually use the same key for a long period of time. This means if a third party gets hold of your private key, they can access any of your encrypted messages and decrypt them. Also, if you lose the device where your private key is stored, and you don’t have it backed up, you will no longer have access to your messages.
The thing with email is that it was never created with security in mind. Back in the 70s, no one was thinking about how or why they would need to protect their messages. It wasn’t long ago that encryption in transit was introduced and is now used by 99% of email providers, although it doesn’t protect data when it’s at rest.
Another problem email currently has is that you can’t be sure that the person who is sending you a message is who they say they are. There are technologies that can prove an email is sent from a particular domain, but they are all optional rather than integrated.
If email was to be designed from scratch now, we would make it secure by default. While we may have other options for sending digital messages now, email is still the default, with solutions like Mailock being the only way to ensure that the data you send is protected.
We carry out code reviews every time a new feature is implemented, sending it out to all members of the team to make sure they have visibility on changes and to make sure these are checked thoroughly before approval. We also carry out scans and regular penetration testing to highlight any vulnerabilities and address them.
Something Mailock has that none of our competitors have is the challenge process, where users can authenticate email recipients before they gain access to sensitive email contents.
We also have the Unipass integration, allowing those working in the finance industry to use their Unipass Identity to send and receive secure emails.
Finally, while a lot of other encryption products have add-ins and integrations with email clients, the journey for the recipient is nearly always carried out on the web, whereas our Outlook add-in is available for both our customers and their end clients.
Mailock doesn’t just focus on the delivery of customer emails; it also ensures the safe return of end-users’ messages.
It really depends on how well you know the person you are emailing. If you only know their name and email, you have the option to verify their email address. If you also know their number, you can use Mailock’s SMS authentication.
If you have spoken to this person on the phone or in person, you can use Q&A authentication, where you can ask them a question that only you and they know the answer to. We give a range of different options to suit the differing relationships our customers may have.
We are always thinking of new ways to make life easier for our customers, without sacrificing the security Mailock offers.
One example is the introduction of the Outlook add-in, which offers users an integrated and more convenient experience.
Not everyone wants to have software downloaded on their computer, so we also offer a web app. This means users can still read and send content safely and securely without needing to install extra programs.
Sabrina McClune, 18.06.24
Sam Kendall, 18.06.24