Security Documentation
Technical analysis of email security, encryption, and privacy
These articles provide technically accurate, cryptographically grounded analysis of email security. We document what zero knowledge and zero trust actually mean, why no email provider can deliver these properties, and how to configure your setup for maximum security.
Core Security Documentation
The Truth About Zero Knowledge / Zero Trust
The definitive explanation of what zero knowledge and zero trust mean in cryptography - not marketing. Covers why these are properties of the client, not the provider, and why every email service that claims these properties is redefining the terms.
Why You Should Never Let a Provider Generate or Store Your Private Key
Technical analysis of key custody, provider-controlled code paths, entropy risks, and why true zero-access requires user-only key ownership.
End-to-End Encryption vs Zero Access Storage
Critical distinctions between true end-to-end encryption (zero trust) and zero access storage (trust required). Explains why these are fundamentally different security models.
The Myth of Jurisdictional Privacy
Comprehensive analysis of why geographical jurisdiction offers limited privacy protection. Documents global surveillance networks, MLATs, intelligence sharing agreements, and why technical safeguards matter more than server location.
Analyzing Zero Knowledge Claims: ProtonMail, Tutanota, and Others
Applying the cryptographic standards above to evaluate specific provider claims. Technical analysis of how major encrypted email providers' architectures compare to actual zero knowledge requirements.
How to Use CodaMail in the Most Secure Fashion Possible
The authoritative guide to configuring email for minimum trust: local key generation, public-key-only upload, automatic PGP encryption, and independent decryption software.
