09/12/2011

The Origins of Push and Pull Email Encryption Delivery

by Jim Brashear

Posts

In a perfect world, the cloud would provide encryption between each and every email account, between company mail systems and consumers or any mix. If that were possible, all public internet email might eventually be encrypted with user transparency (no special software to fire-up, no need for user names or passwords to access secure messages).

However, in the real world, the majority of email endpoints, especially consumers’ computers, are just not equipped to RECEIVE encrypted email transparently, and there is no practical, technical solution that will make that happen. There are just too many ways to receive email (AOL, Yahoo!, Google, Outlook, Notes, etc.) and too many users to upgrade, even if all the necessary software apps existed. That reality is what drove and has sustained the need for well-known push and pull methods for encrypted delivery of email to recipients who are not equipped for transparency.

Push and pull are alternative ways of using standard desktop browsers to let users view encrypted messages. In the case of push, the actual encrypted message is made available to the browser which decrypts and renders it. Pull leaves the encrypted message at a secure, hosted web portal and allows the browser to view it using the same technology used to protect web purchasing sessions (HTTPS). Some people like push, because the recipient assumes full ownership of the message. Technically, pull better matches the framework of what browsers do and were designed to do, making it friendly to tablets and smartphones and robust to browser and security evolution.

Posted: 9/12/2011 12:00:00 AM by Global Administrator | with 0 comments
Filed under: Delivery, Ease, of, Pull, Push, Security, Transparency, use


Recent Posts

05/02/2018

Customer Feedback Rates Zix Above Others

by Geoff Bibby

View Blog Post

04/25/2018

The Fatal Click? The Benefits of Analyzing Suspicious URLs

by Dena Bauckman

View Blog Post

04/18/2018

Tax Season Scammers: Watch for These Red Flags in the Email Inbox

View Blog Post