H E L P

   L O G   I N

To login to mailbox enter your username

Protected by Thawte certificate

Security in S-Mail

  • What makes S-Mail secure?

    Our mail system uses mechanisms developed by Network Research Lab Ltd. They protect your correspondence from any intrusion and are based on the principles of modern military data encryption.

    Back To Top

  • How is my correspondence secure with S-Mail?

    If your addressee is an S-Mail® user your message goes to him encrypted. Protection is automatic and has three main levels:

    1. PGP. The message is encrypted with a randomly generated 128-bit session key which in turn is encrypted with the addressee's 2048-bit key.

    2. Electronic digital signature - DSA. The signature verification key is 1024 bits. Verification of the electronic signature guarantees the integrity of a letter and the authenticity of a return address.

    3. SSL. The message travels along a secure channel where it is additionally encrypted. The length of an encryption key is up to 1024 bits.

    This means that letters and attached files are encrypted and decrypted on a user's PC and are thus protected while being sent and stored.

    You can see the way your correspondence looks for third parties.

    To find out more about encryption/decryption methods used at S-Mail, click here.

    Algorithms and protocols used at S-Mail to protect your correspondence are shown here.

    Back To Top

  • What is encryption?

    Encryption is a special procedure that transforms data into a chaotic mess of symbols and ciphers. An encrypted message is impossible to understand, and therefore impossible to read.

    You can see the way your correspondence looks for third parties.

    Back To Top

  • If a third party intercepts my e-mail, is it possible to decrypt it?

    Any encryption can be broken with time. But, the algorithms used at S-Mail would require very profound cracking procedures. It can take a thousand years to break well-generated passwords like those used at S-Mail.

    Back To Top

  • Is there any way hackers or anyone else can get into S-Mail and tap my correspondence?

    No, there is not. Confidentiality and security are guaranteed with S-Mail.

    Back To Top

  • Can anyone read my mail on my PC when I work with S-Mail?

    When you log on to our server you need to enter your login and password before you start working with your secure mail. If you leave your PC unattended while signed into your mail, an unauthorized person can access your mail. It is like leaving your house with the door unlocked. So, you should take some precautionary measures.

    If you leave your PC for some time, do not forget to log out of the system by pressing the "Logout" button in the upper menu. Any attempt to access the S-Mail account after that requires the user to enter a login and a password.

    The same logout procedure should be carried out if you visit several Internet addresses while working in S-Mail. Another user can access your box and read your correspondence by pressing the "Back" button of a browser. To avoid this, go to S-Mail and leave the system by pressing the "Logout" button in the upper menu.

    Back To Top

  • How does S-Mail send attached files? Is the process secure?

    Attaching files to letters in S-Mail ensures their automatic protection through encryption. All attached files are sent and stored encrypted. Encryption of attached files is completed directly on your PC just as the encryption of the message itself.

    Back To Top

  • Can I use S-Mail outside my home?

    You certainly can. If you are in a foreign country or anywhere in the world where there is Internet access, you can enjoy all the functions and benefits of S-Mail. We strongly advise those who use S-Mail at places with public web access, like Internet cafes, to press the "Logout" button in the upper menu when they finish working.

    Back To Top

  • Do I have to send my secret key to people I am in correspondence with?

    You do not have to exchange secret keys with anyone. Encryption and decryption procedures are carried out by S-Mail automatically.

    Back To Top

    Return to FAQ
  •   privacy | sitemap
     ©  2001 - 2014.