Encrypted Email Protect Users’ Secrets and Identities

Share Article

TrustedPear(TM)'s encrypted email protects users secrets and identities. TrustedPear(TM) cannot be spammed, cannot be traced by a recipient back to the sender, leaves no residue on a user's computer and ensures that users' data is always encrypted. TrustedPear(TM)is ideal for anyone with secrets because it leaves no forensic residue on a computer.

Primum Group Technologies, Inc. (PGTI) announced today that TrustedPear™, its encrypted email service, protects users’ secrets and identities on the Internet with several unique mechanisms. “Most encrypted email systems or network security programs seek to patch holes in existing systems. TrustedPear™ skipped that step: we never built the holes in the first place,” said Kim Smith, TrustedPear™ spokesman. TrustedPear™ is available for free or by subscription at http://www.TrustedPear.com.

TrustedPear™ cannot be spammed, and cannot spam. Typically, spammers and phishers exploit a person’s email address, or a block of addresses from certain Internet service providers. TrustedPear™ doesn’t use public email addresses. Thus, no phishing exploit can be sent to a TrustedPear™ user.

TrustedPear™ users exchange a one-time-use four-character “PearCode™” instead of an email address. Use of this PearCode™ sets up the secret link between the two users. Once the first message is sent, the two users keep writing secretly to each other. No third-party can ever “break into” the communications link between the first two persons—not an ISP, not a system’s administrator, not a boss.

TrustedPear™’s encrypted messages cannot be traced back to the sender. All other email systems use email “headers” and routing information. TrustedPear™ doesn’t use headers. There is nothing to trace. This protects users’ identities. The recipient only knows that they have a TrustedPear™ message from someone who is trusted. They might know who they are writing to, or they might not.

TrustedPear™ data is always encrypted. Users’ secret information is encrypted while the data rests on TrustedPear™ servers, and while it is “in transit” from the user to the server. Only when the user is actually reading a message is it ever “in the clear.”

TrustedPear™ messages do not have a typical “encrypted signal” on the Internet. Thus, users’ messages cannot be intercepted by anyone searching for encrypted data traffic. All other encrypted email systems are obviously encrypted, making easy for someone to identify who is using encryption and who is not. This makes TrustedPear™ “boss-proof,” for those who wish to send messages from work.

TrustedPear™ also does not leave your data on a public Internet site. Users who access their encrypted messages at libraries or kiosks, e.g., keep their identity secret because TrustedPear™ only uses RAM or “volatile” memory.” When the TrustedPear™ window is closed, all data evaporates. This means that a user’s secret data is never left on the public computer.

TrustedPear™ is ideal for anyone with secrets, or who just wants to keep their information private.

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Visit website