
In contrast to gpg- or pgp-encrypted emails, I2P-Bote also encrypts the mail headers. The destination is two in one: the "address" as well as the public key.

They already include the encryption key, so using an iMail destination is not harder than using standard email with gpg encryption. They are much longer than the average email addresses and do not carry the sign nor a domain. iMail addresses are called iMail destinations. Furthermore, all iMails are automatically and transparently end-to-end encrypted.Īt present, iMail cannot be sent to regular email accounts. In invisible mails both the mail's content, and the identities (of the sender as well as the receiver) remain unknown to a third party observer or attacker. HTTPS, or secure connections still allow the server admin to view the content of an email and its related IP number. However, normal emails are visible to an ISP and to the administrators of the mail servers providing the service. Īs with email, one can send and receive iMails.
#Using imail free#
It is an open protocol and its java implementation (I2P-Bote) is free and open-source software, licensed under the GPLv3.

Invisible mail, also referred to as iMail, i-mail or Bote mail, is a method of exchanging digital messages from an author to one or more recipients in a secure and untraceable way. ( Learn how and when to remove this template message) ( February 2011) ( Learn how and when to remove this template message) It may require cleanup to comply with Wikipedia's content policies, particularly neutral point of view. A major contributor to this article appears to have a close connection with its subject.
