Oh no! I can’t hack the encrypted messages by EviCrypt
Contactless Message Encryption EviCrypt NFC HSM: hackers’ nightmare! I can’t read his emails or attachments
With Contactless Message Encryption, add your own encryption layer to your emails with your previously created keys. These are stored in the NFC hardware wallet in which the EviCrypt NFC HSM technology is integrated.
Each person must physically hold at least one NFC card to decrypt and encrypt messages such as emails without contact. It’s end-to-end encryption but human-to-human via an NFC device that slips into their pockets.
Encrypting contactless messages via the NFC card, it gives you end-to-end anonymity from the NFC card. It does not use any remote server to operate. No information about the identity of the owner and/or user is requested and/or collected.
After entering the message in plain text into the phone’s volatile memory, the user encrypts the message contactlessly via the NFC device. The user is then free to choose any of the services available on the NFC phone, such as e-mail, SMS, instant messaging and private messages on social networks. Most importantly, the message entered in clear text is never saved.
Simple and efficient with EviCrypt NFC HSM Webmail technology, encrypt contactless the emails of your usual online messaging system.
Every human must physically hold at least one Encrypt Mail Card to encrypt and decrypt emails. In fact, the encryption is carried out from human to human thanks to an NFC device slipped into his pocket.
Decrypt email by scanning encrypted QR code via NFC phone application. This way, the user does not have to decrypt the message on his computer to avoid the risk of prying eyes.
Keep your favorite email services and add your encryption layer with your own keys via the NFC HSM device. To do this, simply install the extension for your web browser. It will automatically add the encrypt and decrypt function via EviCrypt NFC HSM Webmail in including Gmail, Yahoo mail, Proton Mail, Outlook, Roundcube Webmail, HCL Domino Webmail.
The EviCrypt Webmail extension enables contactless message encryption on a computer via web browsers. The extension allows contactless encryption and decryption of instant messaging services, emails and social network messages on a computer.
The extension for webmail services is tested regularly in order to maintain updates with compatible email services. The last tests were performed on February 10, 2022.
Contactless encryption & decryption of your emails in ProtonMail via an NFC HSM device. ProtonMail compatible webmail link (https://mail.protonmail.com)
Contactless encryption & decryption of your emails in Gmail via an NFC HSM device. Gmail compatible webmail link (https://mail.google.com)
Contactless encryption & decryption of your emails in Outlook live via an NFC HSM device. Outlook Office 365 compatible webmail link (https://outlook.live.com/mail)
Contactless encryption & decryption of your emails in Outlook live via an NFC HSM device. Outlook OVH compatible webmail link (https://mail.ovh.net/owa)
Contactless encryption & decryption of your emails in Yahoo Mail via an NFC HSM device. Yahoo mail compatible webmail link (https://mail.yahoo.com)
Contactless encryption & decryption of your emails in iCloud via an NFC HSM device. iCloud® Apple® compatible webmail link (https://www.icloud.com/mail)
Contactless encryption & decryption of your emails in Roundcube via an NFC HSM device. Roundcube OVH compatible webmail link (https://mail.ovh.net/owa)
Contactless encryption & decryption of your emails in Yandex via an NFC HSM device. Yandex compatible webmail link (https://mail.yandex.com)
Contactless encryption & decryption of your emails in HCL Domino full version via an NFC HSM device. HCL Domino compatible Webmail link (https://missatgeria.govern.ad)
Contactless encryption & decryption of your emails in Horde light version via an NFC HSM device. Horde compatible demo webmail link (http://demo.horde.org)
Contactless encryption & decryption of your emails in Horde light version via an NFC HSM device. Correu Andorra Telecom Webmail link (https://correu.andorra.ad)
Contactless encryption & decryption of your emails in ZOHO Webmail via an NFC HSM device. ZOHO Webmail link (https://www.zoho.com/mail/login.html)
Contactless encryption & decryption of your emails in AOL Webmail via an NFC HSM device. AOL Webmail link (xxx)
* Coming soon
Contactless encryption & decryption of your message in Whatsapp via an NFC HSM device. Whatsapp Web compatible link (https://web.whatsapp.com)
Contactless encryption & decryption of your message in Telegram web via an NFC HSM device. Telegram Web compatible link (https://web.telegram.org/)
Contactless encryption & decryption of your message in Linkedin Web Private messaging via an NFC HSM device. Linkedin Web Private messaging compatible link (https://www.linkedin.com)
Perform end-to-end contactless message encryption, but only between people with the right key and the right NFC card with EviCrypt NFC HSM Webmail Legacy technology. Not only do you remain anonymous, you can create, manage and use your own encryption keys anywhere, anytime, on any computer. You finally have the certainty that you have total control over access to your messages. Above all, you don’t change your habits. You continue to use your favourite email services like Gmail or ThunderBird and soon Yahoo and Outlook.
Turn a webmail like Gmail into an end-to-end encrypted email from an EviCrypt NFC HSM Webmail EviCard or EviTag with or EviPCB or EviPINS. You generate your own keys and store them in your NFC HSM device.
Open Gmail: the emails are all displayed encrypted.
Add to Mozilla’s Thunderbird an extension to encrypt end-to-end but from an NFC Encrypt Mail Card. Generate your own encryption keys and store them in the NFC card.
Open Thunderbird: the emails are all displayed encrypted.
Emails received on your phone always remain displayed encrypted. With your NFC Encrypt Mail card, encrypt and decrypt contactless emails from your phone mail with your own keys.
Only the encryption key stored in the Encrypt Mail card can display in clear, ephemeral way, encrypted messages on a computer system.
The sender and the recipient both have the same encryption key stored in their NFC card.
Encrypt Mail Card is very easy to use and fits in a pocket. Designed to encrypt, with its own keys, e-mails that will be stored in mail servers. So even corrupted emails remain encrypted.
Regardless of the computer or telephone systems on which you read your emails, they will always remain encrypted thanks to your own keys managed without contact via the NFC Encrypt Mail card.
Our contactless message encryption solution, powered by EviCrypt NFC HSM technology, represents a significant advancement in data security. Protected by two international patents, this technology diverges from traditional methods by not relying on remote servers, key exchanges, or storing keys on computer and telephone systems. Instead, it utilizes non-volatile memory within NFC devices to generate, store, manage, and use encryption keys.
Even if mail servers are compromised, both messages and attachments remain encrypted, ensuring that sensitive information is secure. The encryption process is entirely managed by the NFC device, and email displays also remain encrypted, providing robust protection against surveillance and unauthorized access. This solution achieves complete anonymity from end to end, allowing users to maintain privacy in their communications.
Furthermore, EviCrypt NFC HSM offers extensive compatibility with Webmail services, enabling users to continue using their personal or professional email platforms without sacrificing security. The solution is available in thirteen languages, ensuring broad accessibility and a user-friendly experience.
The system does not impose a limit on the number of users, and trust criteria for encryption key exchanges are entirely controlled by the sender. This approach ensures that all encryption processes are managed directly between users, maintaining security and trust without relying on third parties.
The control of access to the encryption keys is secured in multi-factor authentication that can be freely configured by the user. This is the addition of trust criteria of physical origin such as geolocation, password, fingerprint, as opposed to simple access control by password.
Maintaining end-to-end privacy from the NFC Encrypt Mail Cards device. Encryption keys are only stored in the device and individually secured up to 13 different trust criteria. It is physically impossible to compromise an encryption key even when sharing them. Communication protocols such as Wifi, Bluetooth, wired LAN, are encrypted by ephemeral single-use keys. Data exchanges on the communication protocol with NFC are also encrypted.
Encrypt Mail Cards incorporates Freemindtronic’s EviCrypt NFC HSM Technology. It does not use a server to function. Emails are encrypted before being sent to email servers. So even if the mail server is compromised, the messages still remain encrypted.
Encryt Mail Cards works with all computers and all types of operating system such as Windows, Linux, macOS, Pi OS, OS/2, with a Chromium-based Windows web browser such as Chrome, Edge, Opera, Brave including Mozilla’s Firefox. It also works with Android NFC phones. In addition, you remove the risk of synchronizing your email services with computer systems. Everything is managed automatically from the NFC device and the Encryt Mail Cards app on the phone. Thus, you are free to freely use safely any computer and or NFC Android phone.
Encrypt Mail Cards offers end-to-end anonymity from the NFC card. It does not use any remote servers to function. The solution does not request, collect, transferor provide any information on the identity of the owner and /or user. It works on an email service without having to know the identity of the sender and the recipients of the emails. The server receives an email and attachment already encrypt via Encrypt Mail Card. In fact, the sender of an email can decides to use an email service whose identity is anonymous or ephemeral.
Maintaining end-to-end privacy from the NFC Encrypt Mail Cards device. Encryption keys are only stored in the device and individually secured up to 13 different trust criteria. It is physically impossible to compromise an encryption key even when sharing them. Communication protocols such as Wifi, Bluetooth, wired LAN, are encrypted by ephemeral single-use keys. Data exchanges on the communication protocol with NFC are also encrypted.
The Encrypt Mail Cards solution is part of zero trust solutions. This is because mail servers are considered to be presumed to be corrupted. The solution therefore makes it possible to give no trust to the mail servers. Since emails are encrypted upstream by a system physically outsourced via an NFC device, security is ensured even in the event that the server is compromised.
The criteria of trust on the identity of the correspondents are carried out without a trusted third party. They are carried out quickly and simply when sharing encryption keys via an encrypted QR Code. The key creator adds up to 13 different trust criteria at their discretion. To use the encryption, key all trust criteria must be validated. In fact, the recipient of the encrypted message has the certainty of the identity of the sender while maintaining his anonymity.
The research and development department are committed to making the Encrypt Mail Card solution the most secure hardware email encryption system in the world. This is why we design, develop and manufacture our software, applications, web browser extensions, electronic design, embedded system and manufacturing tools. We aim to control the entire value chain from idea to manufacturing of products and services.
.
Encrypt Mail Cards uses an ISO/IEC 15693 NFC component to physically secure access to the data stored in its eprom. The encryption keys are stored encrypted with trust criteria, some of which are defined at the discretion of the user. In addition, at least one of the trust criteria is not physically present in the device. This makes it possible to resist an invasive attack. Thus even if the physical access security is corrupted, the data stored in the memory will always remain encrypted.
EviCrypt NFC HSM offers several distinctive benefits that set it apart from other encryption solutions:
Persistent Email Encryption: Even when emails are displayed, they remain encrypted, providing continuous protection against unauthorized viewing and ensuring that sensitive information is never exposed.
No risk of error using the right key to decrypt emails. Everything is automated. You will have the right key and you will validate all the trust criteria to be able to decrypt as well as to encrypt. Thus, the user does not need any special skills to encrypt or decrypt.
Indeed, as far as the RSA 4096 encryption key is concerned, it is randomly generated by the user. The private key is automatically stored encrypted in the secure memory of the NFC device. The user does not physically have access to the private key. He only has access to the public key. Decryption is done automatically via his private key stored only in the device.
In fact, it is obvious that no third party can decrypt emails without having the right encryption key, the right NFC device and above all having validated all the trust criteria associated with the decryption key in order to use it.
The technology is protected by two invention patents on a new wireless device access control system to secure administrator and user differently and a new segmented key authentication system via wireless device.
Which makes it a unique solution in the world to encrypt only without contact via an NFC device.
The patented segmented key authentication system ensures human-to-human authentication anonymously and not machine-to-machine authentication.
Thus, the level of certainty that you are communicating with the right person has never been higher. In addition, the management of automated trust criteria associated independently by encryption key, are defined at the discretion of the correspondents.
The latter must have the correct NFC device and have validated the multi-authentication and all the trust criteria to be able to use the correct key. Finally, the correspondents can impose without possibility of modification the conditions of use of the encryption key. There is no need for a trusted third party, since trust is established directly between inter-human recipients, in particular via the multi-criteria associated by the creator of the keys.
Encrypt Mail Card encrypts the content of your communications, but will not encrypt the metadata of your email services. In fact, encryption does not hide that you and your friend are communicating, that you are using encryption to communicate and other information such as the subject of your communication, the place, the times.
Reason why, we recommend using encryption even for non-sensitive emails. This is the advantage of this solution compatible with Webmail messaging services. You can use it on an anonymous or ephemeral email address, or use this encryption tool by everyone when possible.
This will make its use normal and not suspicious for those who listen to the networks. Email encryption can be performed offline only on the RAM of the computer and /or phone which will increase the level of security at rest and then in transit.
However, if you send end-to-end encrypted messages by encrypting your data in transit without encrypting your data at rest, this brings another advantage since in principle your messages will be the test of monitoring traffic and listening to the network.
Finally, even if an attacker physically accesses your mobile device or computer, they will not be able to read your encrypted emails.
Encryption keys are only in your Encrypt Mail Cards and in your pocket.
M. Jacques Gascuel CEO Freemindtronic / inventor and M. Fabrice Crasnier Research and Development Director