This white paper describes Hushmail’s security philosophy and outlines the security protocols of our application, network, physical and process security.
Download our "Hushmail Security" white paper (PDF - 237 KB)
This document provides technical information on how authentication and encryption is handled in our range of email services and applications. The security architecture is described in enough detail for a security analysis to determine whether Hushmail is appropriate for various use-cases. This document can also serve as a starting point for a security audit of the Hushmail system.
Download our "Authentication and Encryption Design" white paper (PDF - 270 KB)
Hushmail for iPhone lets you take the secure email experience of Hushmail with you anywhere you go. The app supports encrypted email to anyone, two-step verification, Face ID and Touch ID, multiple accounts and aliases, and it’s synced with your webmail account, for seamless access to contacts and settings.
Published on February 18, 2025
Want to know how Hushmail’s secure emails work and what they look like to clients? Read this article for a behind-the-scenes look at what clients experience when you send them an encrypted email. Read more.