Email Encryption End-to-End
Hermetic Systems

Encryption software for secure end-to-end transmission of messages

a user license
Translate to:
Software Shop
Home Page
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.Glenn Greenwald and Ewen MacAskill (UK Guardian): NSA Prism program taps in to user data of Apple, Google and others

Email encryption has become a hot topic since the revelations by Edward Snowden in mid-2014 that the NSA gobbles up every email message you send, then sifts through them to ascertain whether they contain something worth examining more closely (such as your business plans), or even whether you might be a person of interest to some other 3-letter agencies. But most people believe (partly rightly so) that email encryption is difficult. It doesn't have to be. This software is very easy to use (but nevertheless provides strong encryption). Here is a sample screenshot just prior to encrypting a message:

Email Encryption End-to-End screenshot #1

Compatible with Windows 10

Email Encryption End-to-End makes it easy to send and receive encrypted email. It can be used to encrypt a message to be sent via any desktop email program or webmail that supports attachments (that is, files attached to a message). The encrypted message consists of a text message (up to 60 KB in size) plus, optionally, an appended file of any type (up to 1,980 KB = 1.93 MB in size). The message (including any appended file) is encrypted and written to a ciphertext file. You then attach this file to an ordinary email message. Thus your message is encrypted before it leaves your PC to go to the mail server, and it remains encrypted during transmission to the recipient's ISP and while being downloaded to the recipient's PC. Thus the message is encrypted "end-to-end", and, if intercepted anywhere between your PC and the recipient's PC, cannot be read.

User Manual  
Use of the Program
Specifying the Encryption Key
Comparing Plaintext and Ciphertext for Randomness
The Encryption Method
See also: A Practical Example of the Use of Email Encryption End-to-End

Here is a good article on this subject by Gary Smith:
Email Encryption — A Security System for Today's Wired World
See also German Firms Race to Shield Secrets
and The Encryption Debate is Really About How Best to Spy on You

Here is download3k's review of this software: Email Encryption End-to-End 10.01

Click here to see prices.
Price and ordering: A single-user license for the fully-functional software is available for a period of 3 months, 1 year or with no time limit (a 'perpetual' license). Prices for each type of license are given at Purchase a User License. (A multiple-user license is available for this program.) An activation key is required in order to make the trial version permanently fully functional, and can be obtained immediately (or soon after) your purchase.

Refund: A refund will be provided promptly up to 30 days after purchase if the software does not perform satisfactorily.

Updates: Purchasers of a user license for this software are entitled to an update to any later version at no additional cost.

Hermetic Systems Home Page