The privacy of our conversations is today a concern for everyone. Many Governments, companies and cybercriminals steal personal data and information to classify your profile or to ransom your data. Few solutions are available on the market. They are hard to implement.
Privacy Everywhere has developed a client-mail application that allows end users to install easy and secure privacy.
Privacy Everywhere is raising 600,000 USD to address a billion Dollars market. The business model splits the market into two targets: private users and Enterprise users. Individuals will adopt the free version and between 2% and 10% will upgrade to the premium. The enterprise customers will be approached through direct marketing, peer recommendations, as well as through private users introducing Privacy to their businesses.
The market size includes both email as well as data-storage users and consists of billions of potential customers.
Full-featured, fully secure, convenient and modern.
Utilizing exactly the same algorithms as the top secret government documents.
The keys to the encrypted data are generated by the users and never leave his/her computer.
Key management, encryption, signature, verification and all other cryptographic functionality happen on the user’s own computer.
Privacy Everywhere works with all popular mail services including Gmail, Yahoo, Outlook and many others.
The source code is available for peer review.
|Comparison||Encryption services||PE - Privacy Everywhere|
|Are Proton and PE compatible?||Yes PE and Protonmail both use PGP Standard and are mutually compatible.|
|Can I verify the source code?||No, Can’t know what is on their server.||Yes, Everyone can verify the source code.|
|Is my private key secure?||No, Private key is on Protonmail server.||Yes,Private key is on your devices only!|
|Can I protect any account?||No, Can only protect Protonmail account.||Yes, Protect all your email accounts.|
|Protected from governments?||No, Gov’s can force ProtonMail.||Yes, Not possible to access user’s mail.|
|Can I sign any documents?||No, You can only sign encrypted emails.||Yes, Sign and authenticate any file.|
|Search for or text within encrypted mail?||No, Each email must be decrypt before searching. Takes time!||Yes, Instant search with “on-the-fly decryption” technology.|
|Can governments ban it?||Yes, Banned in Russia and other countries||No, Can be used with any service.|
|Greatest advanatge||An attacker can access mail and keys of 80 million people without their knowledge.||Decentralized mail and keys – no mass attack possible.|