[Some parts of this description make me nervous. Why are PRIVATE keys
being stored on a server, for instance? Why use SSL to send keys when
you could use SSL to just send the data? Etc., etc... --Perry]

FYI, I just put up this piece as a Tasty Bit of the Day at
http://tbtf.com/#tbotoday .
_______________

1999-05-19:

..HushMail: free Web-based email with bulletproof encryption

    Hush Communications has quietly begun beta testing a significant
    development in email privacy. HushMail [1] works like Hotmail or
    Rocketmail -- you can set up multiple free accounts and access them
    from any Web browser anywhere -- but when you email another HushMail
    user your communication is protected by unbreakable encryption. The
    crypto, implemented in a downloadable Java applet, was developed
    outside of US borders and so has no export limitations.

    Here are the FAQ [2] and a more technical overview [3] of the Hush-
    Mail system.

    HushMail public and private keys are 1024 bits long, and are stored
    on a server located in Canada. All information sent between the
    HushApplet and the HushMail server is encrypted via the Blowfish
    symmetric 128-bit algorithm. The key to this symmetric pipe is ran-
    domly generated each session by the server and is transferred to the
    client machine over a secure SSL connection.

    When you sign on as a new user you can choose an anonymous account
    or an identifiable one. For the latter you have to fill out a dem-
    ographic profile, to make you more attractive (in the aggregate) to
    HushMail's advertisers. The HushApplet walks you through generating
    a public-private key-pair. The process is fun and slick as a smelt.
    You need to come up with a secure pass-phrase, and in this process
    HushMail gives only minimal guidance. You might want to visit Arnold
    Reinhold's Diceware page [4], where he lays out a foolproof pass-
    phrase protocol utilizing a pair of dice.

    HushMail relies heavily on Java (JVM 1.1.5 or higher), so it can
    only be used with the latest browsers. The earliest workable version
    of Netscape's browser is 4.04, but some features don't work in
    versions before 4.07; the latest version, 4.5, is best. For Internet
    Explorer users, 4.5 is recommended, but the latest Windows release
    of IE 4.0 (subversion 4.72.3110) works as well. Red Hat Linux
    version 5.2 is also tested and supported. Unfortunately, HushMail
    does not work on Macintoshes, due to limitations in Apple's Java
    implementation. (Mac users can crawl HushMail under Connectix
    Virtual PC. Note that I don't say "run." I've tried this
    interpretation-under-emulation and do not recommend it.) The company
    is trying urgently to connect with the right people at Apple to get
    this situation remedied.

    One of the limitations of this early release of HushMail is that en-
    cryption can only be used to and from another HushMail account. It
    is not currently possible to export your public/private key-pair, to
    set up automatic forwarding of mail sent to a HushMail account, or
    to import non-Hush public keys. I spoke with Cliff Baltzley, Hush's
    CEO and chief technical wizard. He stresses that Hush's desire and
    intention is to move toward interoperability with other players in
    the crypto world, such as PGP and S/MIME. The obstacles to doing so
    are the constraints on technical resources (read: offshore crypto
    programmers) and legal questions of intellectual property. Baltzley
    believes that HushMail's positive impact on privacy worldwide will
    be enhanced by maximizing the product's openness.

    [1] https://www.hushmail.com/
    [2] https://www.hushmail.com/faq.htm
    [3] https://www.hushmail.com/tech_description.htm
    [4] http://world.std.com/~reinhold/diceware.html

_____________________________________________________
Keith Dawson  [EMAIL PROTECTED]  http://dawson.nu/
Layer of ash separates morning and evening milk.


Reply via email to