ZSentry Mail Click to print

ZMAIL Overview
Frequently Asked Questions

How do I use ZMAIL?
You receive ZMAIL at your current email address, using your current software and service, including Outlook, Thunderbird, Apple Mail, Eudora, Gmail, and Yahoo!. You send encrypted email using the ZMAIL web interface, which works like Yahoo!, MSN and Gmail webmail. This program does not use or store password and username lists. ZMAIL integrates email, encryption and message access control, securing your email message and your email address. Works with Windows, Mac OSX, Linux.

How can I see the ZMAIL Menus?
Click the "Expand" symbol.

Does ZMAIL use SSL?
Yes. ZMAIL uses standards-based Secure Sockets Layer (SSL) for secure transactions. Make sure that the web addresses of the ZMAIL pages you use begin with "https://zsentry.com" -- information exchanged with any address beginning with https is encrypted using SSL before transmission. Email security with ZMAIL is more than SSL.

How do I send ZMAIL?
You login to ZSENTRY and compose your email in a secure SSL connection. You can type your email, or copy-and-paste from any text editor. You can also attach an email you compose in Outlook, a file, including Word, Excel or any other file you want. After that, you choose the recipient and additional services such as tracking and notification. Your email is done -- you click SEND. Your encrypted email will be sent in your name (including bounce information), encrypted and authenticated, with the email address you chose when you registered, such as name@isp.com. A report will be shown to you after the email is sent, which you can store or print.

How is my email received?
Your email will be received encrypted and signed at the recipient's mailbox, such as recipient@isp2.com, as a ZMAIL message. The instructions to decrypt, verify and read the ZMAIL are given below.

How about spoofing, phishing and pharming? How do I know I am at correct site when I use it?
With its unique login technology, ZMAIL prevents spoofing and pharming of web sites, protecting the web site zsentry.com. The ZSENTRY login looks like the usual username and password login, but in two screens. You do not have to give your password unless you have a first proof that the website you reached is allowed to process it. The first proof is provided by the Return Code (RC), a three-letter combination (such as "BTP") that you receive when you register. When you verify that the three letters calculated by the website match exactly the three letters of your RC, which you have not disclosed, you have the first proof that the website is legitimate and can be trusted to process your ZSENTRY Password in order to authenticate you. Matching the RC prevents spoofing, phishing and pharming, which SSL alone cannot provide. Additional values that you have not disclosed are provided as proofs for your verification after you log in, including your name and email address that must be correct on top of each page.

See also ZMAIL Spoofing, Phishing, Pharming and Spam FAQ

Do I need to change my ISP or email address?
No. ZMAIL works with and secures any email address you may have.

Do I need to pre-enroll recipients to use encryption?
No. Even the very first message is encrypted.

How is my encrypted email transmitted?
Using standards-based SMTP, from the ZMAIL server to the recipient's mailbox.

How do I decrypt and read a ZMAIL message?
The instructions depend on the message's Skin, which encapsulates your encrypted email message during transport. ZMAIL offers two Skins you can use (click on each type for an example):
  ZMAIL Skin - has web page style (HTML encoding)
  ZSENTRY Skin - has gibberish text ( text encoding)

ZMAIL Skins comply with IETF and W3C standards for email messages, including MIME. The same degree of transport protection is provided for your encrypted message, regardless of which ZMAIL Skin you choose. The choice of Skin should depend only on the recipient's preference, or capability. The ZSENTRY Skin requires the least from the recipient's system, while the ZMAIL Skin allows the message to be read without copy and paste.

The respective instructions to decrypt and read a ZMAIL message are:
- ZMAIL Skin: Open the message IN YOUR BROWSER (double-click on the attachment link or copy-and-paste the attachment link into your browser). Enter your ZSENTRY Usercode directly in the message "LOG IN" window displayed and follow the Login procedure.
- ZSENTRY Skin: Login at ZSENTRY Mail. At the ZMAIL Menu, select Receive ZSENTRY Mail and click NEXT. You will see a Input Box. Drag-and-drop or copy-and-paste the entire ZSENTRY Mail text message body into the Read box. Click READ.

Learn More...

What is verified when my ZMAIL is received?
The message is first verified to be a valid ZMAIL message, which assures the recipient that it is free from tampering -- your message is received as it was sent. Delivery authorization requirements and notification requirements are also verified and enforced before the message can be read. For example, only the intended recipient and the sender are able to read the message. The recipient can also verify additional sender identification, if provided by the sender.

What can the recipient do with the decrypted message, using ZMAIL?
The reader can reply or forward the message to another user (re-encrypted), export the message to Outlook or another application, and download or open the attachment. The recipient can also keep the encrypted message, which is already secure, and archive it for ZMAIL decryption at a later time.

What happens behind the scenes after the recipient logs in?
ZMAIL will detect the message in the incoming stream, verify it (including a verification that the recipient's registered and confirmed email address is the same as the message's intended recipient, as cryptographically assigned), decrypt the message using the authenticated key the recipient has for that sender, and present the plaintext message to the recipient.

What if this is the first email I'm sending to a recipient?
Your message will still be sent encrypted. ZMAIL automatically provides for communication key management.

What happens if I send to multiple recipients?
You can check the box "Separate-To:" if you want to send your message in separate to each recipient (To:), without disclosing to each other who the other recipients are. When the box is not checked (default behavior), still only you (the sender) and the actual recipient of each message can open each message -- even for multiple recipients.

What happens if a recipient is not yet a ZMAIL user?
If the sender allows it, ZMAIL offers an additional, secure, and very user-friendly way to read ZMAIL. The recipient is not required to login or even register in order to read the message once (reply requires login). The recipient receives the ZMAIL in her INBOX and has to click READ (i.e., perform an action). After the message is accessed once, any second attempt shows a notice that the message was already accessed once and can only be read again after login or registration.

This is the same method used by Quantum Key Distribution (here, without QKD) and is verifiably secure. If the recipient can prove to herself that the ZMAIL was not read before (by not seeing the notice), she knows that the ZMAIL contents are, indeed, secret.

Conversely, if the recipient sees the notice but did not read the ZMAIL before, ZMAIL administration has additional system logs that can be used to identify the IP number and other access data for any previous access of that type of message (i.e., read once), to investigate and possibly report any criminal activity to law enforcement.

Alternatively, the sender may require the recipient to register. Registration takes about a minute and no credit card is necessary for a BASIC account. Reading ZMAIL is always free. After registration, the recipient can read your decrypted email that was received before registration.

Can ZMAIL send an email using my keys when I am not logged in?
No. Your user keys are not stored and are literally unknown to everyone until you log in. We do not store your data or personal information in your computer. After you log in, your user keys are used in a "safe box" without access by ZMAIL and then discarded.

Can I protect my email at a webmail site, at my ISP?
Yes. Use any webmail site or ISP for email storage with privacy, by using ZMAIL encryption to protect your messages. ZMAIL empowers you to safely use webmail offers for 100, 1,000 or more megabytes of free storage and free email. If you do not choose to encrypt the Subject line, your emails can also be safely indexed without disclosing the message.

Learn more...

The contents of this entire site and domains zsentry.com are © Copyright, NMA Inc., 2006. All rights reserved, worldwide. Titles and product names are trademarks of NMA, Inc., including NMA, ZSENTRY, Return Code and ZMAIL. Patent pending.