Serverless Electronic Mail
- URL: http://arxiv.org/abs/2007.04608v2
- Date: Tue, 14 Jul 2020 17:32:53 GMT
- Title: Serverless Electronic Mail
- Authors: Geoffrey Goodell
- Abstract summary: We describe a simple approach to peer-to-peer electronic mail that would allow users to exchange messages without relying upon third-party mail server operators.
The system allows participants to establish and use multiple unlinked identities for communication with each other.
The design offers a robust, unintrusive method to use self-certifying Tor onion service names to bootstrap a web of trust.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We describe a simple approach to peer-to-peer electronic mail that would
allow users of ordinary workstations and mobile devices to exchange messages
without relying upon third-party mail server operators. Crucially, the system
allows participants to establish and use multiple unlinked identities for
communication with each other. The architecture leverages ordinary SMTP for
message delivery and Tor for peer-to-peer communication. The design offers a
robust, unintrusive method to use self-certifying Tor onion service names to
bootstrap a web of trust based on public keys for end-to-end authentication and
encryption, which in turn can be used to facilitate message delivery when the
sender and recipient are not online simultaneously. We show how the system can
interoperate with existing email systems and paradigms, allowing users to hold
messages that others can retrieve via IMAP or to operate as a relay between
system participants and external email users. Finally, we show how it is
possible to use a broadcast protocol to implement mailing lists and how
distributed ledger technology might be used to bootstrap consensus about shared
knowledge among list members.
Related papers
- Contract Wallet Using Emails [0.0]
We propose a new construction for contract wallets, smart contract applications that allow users to control their crypto assets.
Users can manipulate their crypto assets by simply sending emails with no need to manage keys.
Unless the sender domain server forges the emails, the crypto assets remain secure in the proposed system.
arXiv Detail & Related papers (2023-12-07T09:48:25Z) - A framework for securing email entrances and mitigating phishing impersonation attacks [0.0]
This work intends to protect users' email composition and settings.
A secure code is applied to the composition send button to curtail insider impersonation attack.
Also, to secure open applications on public and private devices.
arXiv Detail & Related papers (2023-12-07T07:28:34Z) - Device-Independent Quantum Secure Direct Communication with User Authentication [4.757470449749876]
Device-independent (DI) quantum protocols aim to secure quantum communication independent of the devices used.
We introduce the first DI-QSDC protocol that includes user identity authentication to establish the authenticity of both sender and receiver.
We extend this approach to a DI Quantum Dialogue (QD) protocol where both parties can send secret messages upon mutual authentication.
arXiv Detail & Related papers (2023-04-06T16:25:26Z) - One Protocol to Rule Them All? On Securing Interoperable Messaging [3.2213245974344673]
European lawmakers have ruled that users should be able to exchange messages with each other.
messaging interoperability opens up a Pandora's box of security and privacy challenges.
arXiv Detail & Related papers (2023-03-24T17:40:52Z) - Adversarial Learning for Implicit Semantic-Aware Communications [104.08383219177557]
We develop a novel adversarial learning-based implicit semantic-aware communication architecture (iSAC)
We prove that by applying iSAC, the destination user can always learn an inference rule that matches the true inference rule of the source messages.
Experimental results show that the proposed iSAC can offer up to a 19.69 dB improvement over existing non-inferential communication solutions.
arXiv Detail & Related papers (2023-01-27T08:28:12Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - FedGRec: Federated Graph Recommender System with Lazy Update of Latent
Embeddings [108.77460689459247]
We propose a Federated Graph Recommender System (FedGRec) to mitigate privacy concerns.
In our system, users and the server explicitly store latent embeddings for users and items, where the latent embeddings summarize different orders of indirect user-item interactions.
We perform extensive empirical evaluations to verify the efficacy of using latent embeddings as a proxy of missing interaction graph.
arXiv Detail & Related papers (2022-10-25T01:08:20Z) - E-Mail Assistant -- Automation of E-Mail Handling and Management using
Robotic Process Automation [2.4936576553283283]
The bot is equipped with many features that make email handling a stress-free job.
It automatically login into the mailbox through secured channels, distinguishes between the useful and not useful emails, downloads the attached files, creates different directories, and stores the downloaded files into relevant directories.
The bot is designed and tested using the UiPath tool to improve the performance of the system.
arXiv Detail & Related papers (2022-05-12T05:21:58Z) - Quantum Private Information Retrieval for Quantum Messages [71.78056556634196]
Quantum private information retrieval (QPIR) for quantum messages is the protocol in which a user retrieves one of the multiple quantum states from one or multiple servers without revealing which state is retrieved.
We consider QPIR in two different settings: the blind setting, in which the servers contain one copy of the message states, and the visible setting, in which the servers contain the description of the message states.
arXiv Detail & Related papers (2021-01-22T10:28:32Z) - Federated Learning of User Authentication Models [69.93965074814292]
We propose Federated User Authentication (FedUA), a framework for privacy-preserving training of machine learning models.
FedUA adopts federated learning framework to enable a group of users to jointly train a model without sharing the raw inputs.
We show our method is privacy-preserving, scalable with number of users, and allows new users to be added to training without changing the output layer.
arXiv Detail & Related papers (2020-07-09T08:04:38Z) - Learning with Weak Supervision for Email Intent Detection [56.71599262462638]
We propose to leverage user actions as a source of weak supervision to detect intents in emails.
We develop an end-to-end robust deep neural network model for email intent identification.
arXiv Detail & Related papers (2020-05-26T23:41:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.