Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Silent Circle, Lavabit Form Dark Mail Alliance for Secure Email

Silent Circle and Lavabit are teaming up together to form a coalition of companies to create a more secure way to do email.

Silent Circle and Lavabit are teaming up together to form a coalition of companies to create a more secure way to do email.

The coalition is being called the Dark Mail Alliance. Its mission is to offer a “unique end-to-end encrypted protocol and architecture that is the ‘next-generation’ of private and secure email.”

Earlier this year, Silent Circle and Lavabit were among the companies that took a public stance against Internet surveillance efforts in light of the revelations by Edward Snowden, who is the source of information about NSA operations. Silent Circle, which offers secure communications services, ended its Silent Mail email service after Snowden’s leaks became public.  It continued offering other services however.

Lavabit though took it a step further by shutting down its operations entirely. At the time, Lavabit founder Ladar Levison blogged that he would strongly recommend anyone trusting their private data to a company with physical ties to the United States without congressional action and strong judicial oversight.  

Advertisement. Scroll to continue reading.

With the formation of the alliance, the companies hope they can jumpstart adoption of more secure email.

“As founding partners of the Dark Mail Alliance, both Silent Circle and Lavabit will work to bring other members into the alliance, assist them in implementing the new protocol and work jointly to proliferate the world’s first end-to-end encrypted Email 3.0 across email software developers and service providers globally,” the companies said in a joint announcement. “Our goal is to open source the protocol and architecture and help others implement this new technology to address the privacy concerns over surveillance and back door threats of any kind.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.