Forward Email (email provider)

Yes, that means then the provider itself can read your emails. They aren’t open-source either, nor is Proton Mail, so you have no idea what’s going on in the back-end (or at least an assumption of what could be going on).

Decryption of emails that are encrypted with a public key should always be done client-side. That’s the whole purpose of encrypting in the first place; so nobody else can read your mail. See https://forwardemail.net/en/faq#do-you-support-openpgpmime-end-to-end-encryption-e2ee-and-web-key-directory-wkd for a complete list of every platform and the associated plugins that can be used client-side.

2 Likes

To be fair, encrypting incoming emails on Mailbox.org only requires the public key: Your encrypted mailbox | Knowledge Base

The article you link to where they talk about uploading your private key is only for encrypting outgoing emails in their webmail client.

Thanks @jonah, we’ve updated mailbox[dot]org on our website comparison page:

3 Likes

Hi there folks! :wave:

As far as we can see, the only concerns regarding our service in this thread for the expressed Privacy Guides inclusion criteria having been met are the following:

  1. An independent security audit
  2. How the free plan did not encrypt your forwarding configuration (privacy even on free plan was requested)
  3. Export as EML/MBOX

Rest assured, we’ve resolved (2) and (3) completely :tada: — and have plans for an audit… keep reading!

Criteria Concerns

1. An independent security audit

Regarding the audit: no service out there (other than us) is 100% open-source. Others advertise as open-source, but they aren’t. Take Skiff for example, they advertised as open-source, but only their front-end was. And then they shut down.

Another is Proton Mail, and yet again, only their front-end is open-source.

Other providers advertise as having an audit, but if you look closely, either it’s never been published (e.g. Skiff) or they only have listed vague information on their website about the audit.

These “other providers” are already listed in Privacy Guides too. Additionally, the top recommended provider of Proton Mail has yet to publish an audit of their back-end. This was already discussed previously in this thread:

It’s one thing to audit front-end apps, it’s entirely different (and should give some serious concern) to not publish back-end source code nor an audit of the back-end infrastructure, and claim to be privacy-focused and open-source when it comes to user’s email and private data. Here is Proton Mail’s page on being open-source (front-end only).

Mullvad is a perfect example of this done right. We take a lot of inspiration from them with everything they do (and we’ve read every one of their audit whitepapers). We’ve even used them as inspiration for our ansible scripts through these published audits and their related blog posts.

Note that we do have plans to conduct an audit. We’re trying to complete some other more pressing items right now in advance of one – and as mentioned earlier in this thread, we’ve already prepared this list of security audit and penetration testing companies we’re looking at. We’ve already reached out to some of them including Cure53 to obtain pricing and more information.

Lastly, it’s simply not part of the criteria to have an audit. See the discussion at https://discuss.privacyguides.net/t/forward-email-email-provider/13370/30. This isn’t going to deter us from obtaining one though – and we hope that isn’t a reason for exclusion from being listed on PG’s recommended email services.

2. How the free plan did not encrypt your forwarding configuration (privacy even on free plan was requested)

As of July 2024 we now support TXT encryption even on the free plan. Throughout our website, FAQ, and guides, there is an “Encrypt” button (even on the free plan) and a dedicated page at https://forwardemail.net/encrypt which goes into detail on this. All users, regardless of how much they pay (even $0), can hide and mask their email forwarding configuration and email addresses/webhooks/ports/domains/regular expressions.

Additionally we’ve published our GDPR and DPA pages at https://forwardemail.net/gdpr and https://forwardemail.net/dpa respectively. We took a lot of care (and time) to publish these and be sure to list all of our sub-processors (we only have 5):

Cloudflare (US; DNS, networking, and security provider), Vultr (US; hosting provider), Digital Ocean (US; hosting provider), Stripe (US; payment processor), PayPal (US; payment processor)

Unlike others, we don’t even use any third-party tracking/analytics software (e.g. we don’t use Plausible Analytics, Google Analytics, or anything similar for telemetry). We even built our own logging system using our tools :axe: Axe and :wood: Cabin, our own job scheduler called Bree, our own DNS over HTTPS layer called :tangerine: Tangerine, and our own Spam Scanner. Our goal is to have as few SPOF as possible, all open-source.

3. Export as EML/MBOX

One criteria/bullet point that this thread didn’t give any attention to yet that we wanted to bring up was exporting as an EML/MBOX file:

  • Export capability as Mbox or individual .eml with RFC5322 standard.

We already did support this (in a sense, albeit not the easiest) – but at anytime a user could export their mailbox using Thunderbird (e.g. set it up in Thunderbird, download their message over IMAP, and then export).

We have a migration guide as well and users could already download their raw encrypted SQLite database file at anytime as well (or a backup) and open it with SQLite Studio for inspection.

BUT we just went one step further and just now deployed a new feature to production! :tada:

You can now export EML files directly in Forward Email for any of your mailboxes. MBOX is coming soon. At no point in time is your encrypted database leaked on disk during this export process. We use in-memory streams and AES-256 encryption with your password on the ZIP file, which is only available for download in Cloudflare R2 for 4 hours with the download link provided over email.

Here’s a few screenshots:

Source code: https://github.com/forwardemail/forwardemail.net/blob/1798cab7e78270b9f4dd4b93d04bcca9298eb7b7/helpers/worker.js (see backup function)

In conclusion

All other criteria listed has been met. We’ve already established in earlier comments that we’ve met them; see these comments https://discuss.privacyguides.net/t/forward-email-email-provider/13370/24 (and before/after comments).

Our pull request is still available at https://github.com/privacyguides/privacyguides.org/pull/2358. We’re happy to make any changes necessary or update/rebase it as needed.

Hopefully this post gives you the confidence in our service (and our participation over the past year+ too here on PG)!

If there is anything more we can do to get your support for inclusion, or anything we’re missing, please do let us know!

For your consideration!

Edit: Also – we’re only 3 years younger than Proton Mail / mailbox; been running since 2017.

5 Likes

Please stop tagging team members. Thank you.
Your product will be reviewed by us and the rest of the community as per our standards. This does take a while and please respect that. The reasom being our careful considerations and assesments. Especially email is a very vital tool to do right and making wrong recommendations like has happend in our community before is a burden on our readers, this is the reason we proceed with at most care. Do note we have not forgotten about you, but please remain patient.

3 Likes

I also think the provider is being too pushy with this. I know how hard it is to run a privacy oriented service, especially when the community is full of skeptics, but some of the pressure directed here feels a bit aggressive from them. For example, see this Wikipedia listing they are pushing which keeps being rejected (for “not having reliable source”, since they keep citing their site as a reference).

Additionally, their constant claims of being open-source and not having “closed-source” servers are irrelevant, since if the client side is implemented well and audited to do what it is supposed to do, most E2EE services don’t actually need to show how their servers function (since a lot of these services actually have a threat model of third parties like AWS operating their infrastructure). This is a fundamental misunderstanding of how Proton and other services work, especially in their native clients.

Sorry if it’s coming off as pushy. Just trying to keep up with feedback and keep updates in a central place here for reviewers as they may be going back and forth. We can keep those in a changelog or similar to make sure those here can reference back if they’re missing updates.

Also this has been open for a year, so we’re just trying to figure out what else is needed and doing our best to stay engaged.

The wikipedia issue was my fault. I haven’t done that before and was trying to tweak the sources and links and having issues with the template / tags. User error on my part.

5 Likes

Hi Shaun, if you’re affiliated with Forward Email please DM me so we can verify that fact. I appreciate the updates, it’s made keeping up with Forward Email development very convenient.

8 Likes

Not related to the product, but i dig the developers for being so communicative. Really awesome to see. They clearly are passionate about what they are doing.

7 Likes

3 posts were merged into an existing topic: Forward Email (new features)

Hi there @MMA-block – specifically, “As law permits” is the text that is important here, and it is related to emergency data requests (“EDR’s”). Note that the same folks that monitor the support inboxes are also the core engineers here at Forward Email (we have a small team). It should be known that we are experts in email verification (e.g. SPF/DKIM/DMARC checks, or lack thereof; and subsequent independent verification), and more for any such EDR – therefore it is extremely unlikely that a scammer could trick us into providing information to a fraudulent EDR. We would of course contact the requester by their phone (from an independent search and research/verification process) to verify the EDR and would never just blindly send information.

See Emergency data request - Wikipedia and Wikimedia Foundation Requests for User Information Procedures and Guidelines - Wikimedia Foundation Governance Wiki

We do not have your IMAP password, so we cannot access your emails stored in your mailbox, and we also do not store any forwarded emails to disk (it’s all done in-memory).

Additionally, outbound mail is immediately redacted after sending. See https://github.com/forwardemail/forwardemail.net/blob/ab4edcbc39578382f9f0d5379e2ddab31586ab49/app/models/emails.js#L722-L735.

Consider us a “zero-knowledge service”.

Also – if PG were to make any sort of disclaimer, our opinion is that disclaimer should be directed at companies such as Proton Mail and Tuta that advertise as open-source, yet their backends are completely closed source.

1 Like

See similar EDR policies, which is standard in the industry:

Cloudflare: https://www.cloudflare.com/trust-hub/law-enforcement/#:~:text=types%20of%20information-,Emergency%20requests,-In%20accordance%20with

Digital Ocean: https://www.digitalocean.com/legal/law-enforcement-guidelines#emergency-requests:~:text=S.C.%202523.-,Emergency%20Requests,-As%20US%20law

Also – we’re well aware of hackers exploiting this, e.g. see this article from The Guardian, but again keep in mind we try to be a zero-knowledge service while still providing a good user experience.

We do not agree and this has been explained many times to you in this thread. Can you stop bringing up the same arguement each time. While we love open source there is no benefit to the user for open source backends as all encryption is implemented in the open source client apps.

3 Likes

In the case of Tuta and Proton (not sure about mailbox) they only provide information after a judge has given the order for that. Now that is quite a difference from your policy. I unfortunatly also see that police forces do many warrentless requests often not in good faith. I am not familair enough with US law to know whether such policy is viable you, but surely that would be preferred.

1 Like

Emergency data request (“EDR”) are only honored in good faith belief that disclosure is permitted (see 18 U.S.C. §2702 (b)(8) and §2702 (c)).

1 Like

More of a techical question tho. From your CSP I can see you allow a form from a marketing affiliate company anrdoezrs[.]net why is that?

We already went over this. Here is why you should not worry about this:

  1. They are honored in good faith, to our discretion, and with independent verification. If someone sends us an email (spoofed or not) as coming from a government, state, or local jurisdiction/law enforcement – regardless of what information is the in email, we’re going to independently call the office (as from the phone number in public listing and/or on their website or government; e.g. .gov website) to verify the request. We would also check other metadata, such as where the email came from (IP), headers, who sent it, etc. We wouldn’t simply honor an EDR over email alone. We have to operate within the law, according to 18 U.S.C. §2702 (b)(8) 2 and §2702 (c) as previously linked. ‘As law permits’ means that it’s with accordance with these sections.

  2. Anything stored with IMAP/POP3/CalDAV is encrypted using ChaCha20-Poly1305 your IMAP password in a SQLite file. Unlike other providers, we don’t use massive shared relational databases. Additionally, as mentioned, we do not store forwarded emails, it is all done in-memory. This means that we have little to no information that could be even provided for such an EDR or even a valid subpoena in general.

We’re a business and our policies must be in compliance within United States law. We cannot falsely advertise either. We’re transparent and actively participating here.

Proton was founded in 2014, Tuta 2011, mailbox 2014, Skiff was 2020, Forward Email 2017.

2 Likes

This was a legacy artifact from a few years ago when we used Commission Junction’s Namecheap affiliate program for when people purchase domain names. This is now fixed, thank you pinging us about this.

Commit: https://github.com/forwardemail/forwardemail.net/commit/aed372cf7c639307420ff05ed34b272ae10664e3

Screenshot:

Link: https://forwardemail.net/domain-registration

3 Likes

We’re going to look at updating verbiage on that page to be clearer and not open to misinterpretation. We’ve just updated the verbiage on that page for clarity.

See https://forwardemail.net/en/report-abuse#law-enforcement-emergency-requests

Thank you for your feedback :pray:

1 Like

What risk is there in other providers using a shared relational database?