This white paper describes Hushmail’s security philosophy and outlines the security protocols of our application, network, physical and process security.
Download our "Hushmail Security" white paper (PDF - 237 KB)
This document provides technical information on how authentication and encryption is handled in our range of email services and applications. The security architecture is described in enough detail for a security analysis to determine whether Hushmail is appropriate for various use-cases. This document can also serve as a starting point for a security audit of the Hushmail system.
Hushmail for iPhone lets you take the secure email experience of Hushmail with you anywhere you go. The app supports encrypted email to anyone, two-step verification, Face ID and Touch ID, multiple accounts and aliases, and it’s synced with your webmail account, for seamless access to contacts and settings.
Published on June 17, 2021
We’re taking a look at HIPAA violations: how they occur, how they are reported, what happens during and after an investigation, and what you can do to prevent a complaint from being filed in the first place. Read more.