Jumble never hosts your email data and so we have no access to it. Jumble also has no access to unencrypted private key data. Likewise the email provider has no access to the keys so once the emails are encrypted they can only ever be decrypted and read by the sender and recipient.
Encrypt as many emails as you want with Jumble for free – no catch!
Decrypt as many emails as you want with Jumble for free – no catch!
Jumble uses standard encryption algorithms that have been published and peer reviewed over many years. Specifically, we use 256-bit AES keys to encrypt the email data and then use a 2048-bit RSA public key to encrypt the AES key. In fact we use 2 different sets of encryption keys for each email you send:
Jumble was designed so that it could be used without any knowledge of data security, encryption or encryption keys.
Once you install Jumble you’ll notice some subtle changes to your email account – you’ll have a new button “Secure send” in your compose window.
Also, you can email anyone securely with Jumble – the recipient does not need to be a Jumble user for you to send an email encrypted with Jumble. Once they receive the email they will need to register with Jumble to decrypt for FREE – simple!
We know email is important in day-to-day life. Protecting it is also important. This is why we make Jumble available on your portable devices.
Because your iPhone and iPad can connect to public networks these devices are the most vulnerable to email woes. With the Jumble App you are protected everywhere, giving you always-on email security.
Let’s take a look at Alice; she wants to send Bob a secure email and has come to Jumble for help.
When Alice registers with Jumble we create a special set of encryption keys and hold them for her. This allows her to login from any device or location while ensuring that her encryption keys are always available; this means she can access her emails on the go, from mobile devices, anywhere!
We use a special type of cryptography called Public Key cryptography; this means that the key we generated for Alice, let’s call is KEY-A, is actually composed of two parts; one we keep private just for Alice (this is used to decrypt messages sent to her), and a public one that we give to anyone who wants to send Alice an encrypted email.
Alice’s Jumble password is the master key for her encrypted emails. When she sends an encrypted email with Jumble we generate a random encryption key, let's call this one KEY-B. We then use Alice’s public KEY-A to encrypt KEY-B and include the encrypted version of KEY-B in the email and send it to the recipients.
This means that when Bob receives an email from Alice he can use his private KEY-A to access the message. And because Jumble always has the keys ready and waiting for Bob, he can access his emails anywhere, anytime, on desktop, mobile, tablet and email clients.