09/12/2011

The Origins of Push and Pull Email Encryption Delivery

by Jim Brashear

Posts

In a perfect world, the cloud would provide encryption between each and every email account, between company mail systems and consumers or any mix. If that were possible, all public internet email might eventually be encrypted with user transparency (no special software to fire-up, no need for user names or passwords to access secure messages).

However, in the real world, the majority of email endpoints, especially consumers’ computers, are just not equipped to RECEIVE encrypted email transparently, and there is no practical, technical solution that will make that happen. There are just too many ways to receive email (AOL, Yahoo!, Google, Outlook, Notes, etc.) and too many users to upgrade, even if all the necessary software apps existed. That reality is what drove and has sustained the need for well-known push and pull methods for encrypted delivery of email to recipients who are not equipped for transparency.

Push and pull are alternative ways of using standard desktop browsers to let users view encrypted messages. In the case of push, the actual encrypted message is made available to the browser which decrypts and renders it. Pull leaves the encrypted message at a secure, hosted web portal and allows the browser to view it using the same technology used to protect web purchasing sessions (HTTPS). Some people like push, because the recipient assumes full ownership of the message. Technically, pull better matches the framework of what browsers do and were designed to do, making it friendly to tablets and smartphones and robust to browser and security evolution.

Posted: 9/12/2011 12:00:00 AM by Global Administrator | with 0 comments
Filed under: Delivery, Ease, of, Pull, Push, Security, Transparency, use


Recent Posts

11/21/2017

The Best Defense is Good Offense When Protecting Your Inboxes

View Blog Post

11/14/2017

How to Spot BEC Attacks and Best Limit Their Success

by Guest Blogger Michael Osterman

View Blog Post

11/01/2017

Why Google’s Transparency Report Reveals Only the First Step Toward Email Security

by Geoff Bibby

View Blog Post