x
about
kybermail is a post-quantum end-to-end encrypted messaging system.
your private key is generated in your browser and never sent to the server. it is your identity and your login credential — the server cannot recover it if lost. your public key is what others use to reach you.
encryption uses ML-KEM-768 (FIPS 203), a post-quantum standard designed to resist attacks from both classical and quantum computers. all cryptographic operations run entirely in your browser. the server stores only encrypted ciphertext and cannot read message content, private keys, contacts, or drafts.
each message uses a fresh ephemeral keypair (forward secrecy), so compromising a long-term key does not expose past messages. messages are signed with ECDSA so recipients can verify the sender cryptographically. files are stripped of metadata before encryption. ciphertexts are padded to fixed-size buckets to prevent content-length inference.
key storage options: QR code, passphrase-encrypted .kybermail file, or device memory (IndexedDB, opt-in). a duress login opens a decoy mailbox — see settings for details and the accompanying legal disclaimer.
remember "harvest now, decrypt later". assume all traffic is logged indefinitely and may become decryptable. classical encryption will not protect you against a future quantum adversary — kybermail uses post-quantum cryptography specifically because of this.
view full threat model →
do not use this service for illegal activities.