Metadata Protection

GoodCrypto uses Ed Snowden's design from HOPE X to encrypt your email, both content and metadata.

Exposed metadata can be more dangerous than content. As former CIA/NSA boss Gen. Michael Hayden admitted, "We kill people based on metadata."

With a simple click, you can block both network and traffic analysis. Spies who tap your line get just one bit of data, that Group A communicates with Group B. They don't know who, what, when or even how much information an individual exchanges with someone else. What spies see is useless, because it is always the same. The same schedule, the same amount, and always encrypted, including metadata.

Of course, until other packages implement this open source protocol for metadata protection, you will need GoodCrypto on both ends.

More:

 

 

 

Protect metadata

This overview is for IT administrators. If you prefer security details see Security focus: How does mail metadata protection work?

GoodCrypto uses Ed Snowden's design from HOPE X to protect email metadata. Very quickly, GoodCrypto :

  1. Uses GPG to encrypt from individual to individual.
  2. Periodically mixes all messages to a domain into the body of a single message.
  3. Pads and uses GPG to encrypt the mixed group message. This encrypts all end user metadata.

When GoodCrypto first boots it prepares an email address and key for your domain. This is separate from the keys for individuals. Keys are automatically exchanged the first time that two GoodCrypto mail domains connect.

On a regular schedule GoodCrypto:

  • Signs and encrypts messages going to a domain with each individual's key.
  • Attaches all the messages for that domain to one new message.
  • Pads the mixed group message to a fixed size.
  • Encrypts the group message.
Because all individual metadata is in the group message body, the metadata is encrypted. The sender, recipient, subject, and content of messages are completely hidden. Useless domain metadata is all that's visible, only showing that the two groups might be exchanging private email.

When a message arrives at the destination, GoodCrypto reverses the process and delivers individual messages

Usually both the sender and recipient have personal keys. Then their individual messages are encrypted in layers, first with the individual key and then with the metadata key.

GoodCrypto automatically exchanges keys. The administrator receives email whenever a new metadata key arrives so so it can be verified.

As both systems generate and exchange keys, GoodCrypto continuously makes your mail more secure. If you need to be sure that your first contact is safe, check that your GoodCrypto private server has a metadata key for the other domain.

Of course, until other packages implement this open source protocol for metadata protection, you will need GoodCrypto on both ends.

 

 

 

Stop network and traffic analysis

GoodCrypto uses packetization, padding, and encryption to stop both network and traffic analysis. On a regular schedule it combines individual messages going to a group, pads them to a standard size, and wraps them in an extra layer of encryption that protects all the messsages and hides all individual metadata.

The default settings send a single one MB group-to-group message every hour, even when no individuals have sent mail to the other group. That allows the equivalent of one entire book of email text every hour. It adds just one GB of traffic per month per group to stop traffic analysis. The administrator can change these settings.

If the total of pending outgoing individual messages are too big for a single standard group message, unsent messages are queued for later. If a message is bigger than the group message size it is returned to the sender with an explanation.