The Dark Mail Alliance is an organization dedicated to creating an
email
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" meant ...
protocol
Protocol may refer to:
Sociology and politics
* Protocol (politics), a formal agreement between nation states
* Protocol (diplomacy), the etiquette of diplomacy and affairs of state
* Etiquette, a code of personal behavior
Science and technolog ...
and architecture with
end-to-end encryption
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, and even ...
.
In October 2013,
Silent Circle and
Lavabit
Lavabit is an open-source encrypted webmail service, founded in 2004. The service suspended its operations on August 8, 2013 after the U.S. Federal Government ordered it to turn over its Secure Sockets Layer (SSL) private keys, in order to al ...
announced a project to create a more secure alternative to email and began a fundraising effort. The Dark Mail Alliance team consists of
Phil Zimmermann
Philip R. Zimmermann (born 1954) is an American computer scientist and Cryptography, cryptographer. He is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoI ...
,
Jon Callas
Jon Callas is an American computer security expert, software engineer, user experience designer, and technologist who is the co-founder and former CTO of the global encrypted communications service Silent Circle.http://www.linkedin.com/in/joncal ...
, Mike Janke, and
Ladar Levison
Lavabit is an open-source encrypted webmail service, founded in 2004. The service suspended its operations on August 8, 2013 after the U.S. Federal Government ordered it to turn over its Secure Sockets Layer (SSL) private keys, in order to allo ...
.
DIME
Dark Internet Mail Environment (DIME) aims to be a secure communication platform for asynchronous messaging across the Internet. It was presented by Ladar Levison and
Stephen Watt at
DEF CON
DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyer ...
on August 8, 2014.
Specifications
There have been multiple revisions for DIME specifications. The latest revision is presented as a preliminary draft.
* First public revision, December 2014
* Preliminary draft, March 2015
Protocols
* Dark Mail Transfer Protocol (DMTP)
* Dark Mail Access Protocol (DMAP)
Data formats
* Signet
Data Format
* Message Data Format (
D/
MIME
Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs. Message ...
)
Implementations
Server-side
Magma is the reference MIME server implementation. It supports server side encryption,
Simple Mail Transfer Protocol
The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages. User-level email clients typica ...
(SMTP),
Post Office Protocol
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use, and along with IMAP the most common p ...
(POP),
Internet Message Access Protocol
In computing, the Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. IMAP is defined by .
IMAP was designed with the goal of per ...
(IMAP) and
Hypertext Transfer Protocol
The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, ...
(HTTP).
Client-side
Volcano, a
Thunderbird
Thunderbird, thunder bird or thunderbirds may refer to:
* Thunderbird (mythology), a legendary creature in certain North American indigenous peoples' history and culture
* Ford Thunderbird, a car
Birds
* Dromornithidae, extinct flightless birds ...
fork with DIME support.
See also
*
Email encryption Email encryption is encryption of email messages to protect the content from being read by entities other than the intended recipients. Email encryption may also include authentication.
Email is prone to the disclosure of information. Most emails a ...
*
Email privacy
Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as w ...
*
Kolab Now
Kolab Now is a web-based email and groupware service, based completely on free and open-source software. It is owned and operated by Kolab Systems AG and was formerly known as MyKolab.
Kolab
Kolab Systems AG is the company behind the Kolab ...
*
Pretty Good Privacy
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partition ...
*
pretty Easy privacy
pretty Easy privacy (p≡p or pEp) is a pluggable data encryption and verification system, which provides automatic cryptographic key management through a set of libraries (providing p≡p adapters for application developers' used programming ...
References
{{Reflist
External links
Dark Mail Alliance web site
Email
Privacy of telecommunications
Internet privacy organizations
Computer security organizations
2013 establishments