Free Encrypted Email Service

[ Encryption Tools | Acceptable Use Policy | Add this resource page to your Favorites]

[ Home | Network Tools | Encrypted Email Help ]
Copyright 2003 - MPRM Group -

Why Should I Use Encrypted Email

Estimates suggest that there are currently hundreds of persons using the internet who can read your confidential email messages when sent from an unprotected, non-encrypted email client. Spy agencies run by many national governments, including unfriendly ones, scan everyone's email! Bad guys do it too.

You can prevent such snoopy eavesdroppers from reading your email by encrypting it. This is done by transforming your plain text message into hard-to-decode cipher text. 

About Our Free Encrypted Email Service

The aim of our service is to transmit your email text message in an encrypted form so that it cannot be parsed for key words while enroute. What happens once it is stored on the receiver's computer is up to them and the protective security measures they have enabled.

Your e-mail remains encrypted from the time it is sent and until it is received and decrypted by the intended recipient. The recipient automatically receives instructions for decrypting messages. No unencrypted message is transmitted across the internet.

Between transmissions when your e-mail is stored on mail servers, the message remains encrypted and the content cannot be "sniffed" for specific key words as is the manner in which email "eavesdroppers" select the emails they want to read.

Using our encrypted email service there is no need to exchange passwords or complex public key details with encrypted email recipients. The encrypted email recipients are automatically sent instructions for deciphering the encrypted email. Sending an encrypted email message using our service is as simple as sending an ordinary Web-Mail. Other email encryption methods require the sender and receiver to exchange public keys which is complicated, inconvenient and not very practical when sending encoded email messages in a spontaneous fashion.

Encrypted Email at

This is an example of what the Encrypted Email Panel at looks like.

Once you have obtained a Temporary Password and clicked the button below, an email panel such as that illustrated above will open.

  1. "To:" - Enter the recipient's email address and check it to be certain there is no typing error.
  2. "Your Name" - This the name that will appear in the "From" section of the receiver's email client. 
  3. "Your email"  - Enter your email address and check it to be certain there is no typing error.
  4. "Subject" - Enter the subject of your encrypted email.
  5. "Comments" - Enter your email message in the text area provided. Check it fully before you change to an encrypted email.
  6. Press the Encrypt button at the bottom of the panel to encrypt the email message.
  7. Press "Send" at the top left of the panel.


More About Encrypted Email

You come to work or school one day to find that an FBI special agent has just paid a visit and that the system administrator has shut down your computer account to comply with a subpoena for all of your email and other computer files. One of "your" non-encrypted email files contains a large collection of credit card information or a "Nigerian Fraud Email" or a variety of scam projects or even all of these. Junk Mail? You did not create those non-encrypted email files and know nothing about it.

You have been using hard-to-guess passwords and changing them regularly. How could someone have gotten access to your computer to use it for this scurrilous activity? How would the FBI or other agency find it? One likely possibility is that as well as being a recipient of a ton of spam or junk email, you have been a victim of an email packet sniffer attack.

The information you transmit via email is essentially being sent back and forth along a wire. Anyone along that wire has the access enough to intercept and read the text. It's fairly easy to do. You might think that there would be an awful large amount of text information to scan. That's true, but the people doing the packet sniffing are looking for very specific key words. They program their "sniffing" software to perform certain actions and both store and flag messages containing certain key words. 

That's where encrypted email comes in. The words in your encrypted email are gibberish to such packet sniffers and the email passes unread by the eavesdropper. As your encrypted email travels to the destination mail server via as many as 30 hops from computer to computer, the various packet sniffers that intercept the encrypted email will only read sense from the to and from addresses. The encrypted email's message portion will pass by the eavesdropper unnoticed. 

Contact  About  Privacy Policy  Legal  Site  Browser  

Secure Network Technology

Acceptable Use Policy For Encrypted Email

By using this Encrypted Email service you agree to our acceptable use policy and to respect the privacy of others. Encrypted Email services must not be used for any improper purpose.

MPRM Group Limited at
Encrypted Email

[ Home | Network Tools | Send Encrypted Mail | Encrypted Email Help ]

Contact Us

Our OpenPGP Key Server
DNS / NetTools
Detect Intruders
Email Encryption

Free Scripts


Net Crime

Encryption Tool

Security Topics


Network Tools
Network  Hacking  Security  Terminology
Web Services
WinNT Security

Valid HTML 4.01! Valid CSS!