To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Mailpile
Original author(s)Bjarni Rúnar Einarsson, Brennan Novak, Smári McCarthy[1][2]
Developer(s)The Mailpile Team
Initial release13 September 2014; 9 years ago (2014-09-13)[3]
Stable release1.0.0rc6 (September 4, 2019; 4 years ago (2019-09-04)[4]) [±]
Repository
Written inPython
Operating systemLinux, macOS, Windows
PlatformWeb platform
Available inMore than 14 languages[5] Arabic (ar) Danish (da_DK) German (de) Greek (el_GR) Spanish (es_ES) French (fr_FR) Croatian (hr) Icelandic (is) Japanese (ja) Lithuanian (lt) Norwegian Bokmål (nb_NO) Dutch (nl_BE) Dutch (nl_NL) Polish (pl) Portuguese (pt_BR) Russian (ru_RU) Albanian (sq) Swedish (sv) Ukrainian (uk) Chinese (zh_CN)
TypeWebmail
License2015: AGPL-3.0-or-later[6]
2013: Dual-licensed[a]
2011: AGPL-3.0-or-later
WebsiteOfficial website Edit this at Wikidata

Mailpile is a free and open-source email client with the main focus of privacy and usability. It is a webmail client, albeit one run from the user's computer, as a downloaded program launched as a local website.

YouTube Encyclopedic

  • 1/3
    Views:
    885
    325
    2 195
  • Brennan Novak: Secure Crypto for Browser Based Apps | JSConf EU 2014
  • Eleanor Saitta - Security as Whole System
  • MailHub Screencast - MacUpdate Promo

Transcription

Thank you for listening to my talk. It is my first time on the JS conf stage. I have a handful of friends who had. This is the title of my talk. Last year, some of you heard of Edward Snowden. And the revelations about Nsa. He didn't talk about malicious hackers. Some people might not worry about government surveillance. Being secure is important. We saw a rise in crypto currencies. About a year ago. The number of Bitcoin wallets were half a million. Now they are over 2. There are other crypto currencies. They are normal cryptography and security. Snowden said, the bottom line is that the crypto does work. They can't break the math out there. Strong crypto, we really need it. Secure file transfer. It is important. That is your money if you are into that. I am not a cryptographer as all. I'm a UI/UX designer. I have been working on Mailpile for the last year. A secure way to read, write and organize piles of email. When we started working about it, when the Snowden stuff started leaking. We need to focus on it a lot. We consulted with the security community. We are not going to do javascript cryptography. Maybe you hope to see that. The talks yesterdat were about that. I will go into it. And why we chose not to do it. One of the first aspects of cryptography and public private key cryptography is secure key generation. In order to sign and verify and send data. And here is an example that somebody made recently about Javascript cryptography. Using curves instead of prime numbers, we can generate faster keys zozer He will generate it here while the keybase Pgp. He was proud of how fast it is. It is awesome. Right about here he typed a command. Window.Crypto. Tim's talk focused on it. It is awesome, exciting Api. We are going to hopefully integrate. Once it stabalizes a bit more. When we looked into it a year ago. This was 2 days ago. Some of the Api's have stabilized. But Window.Crypto is not supported in a lot of browsers. Okay, why not choose an Html5 app? Or chrome or Firefox or Opera or IE app. You get the point. And in that case you are getting a browser that has the api's available and you run the cryptography in Javascript. Email, you are dealing with a large volumes. Browser specific shims. And that can be a nightbeir. Not really Smtp or Imap support from Browser app. Firefox OS is making progress. You can do it in Firefox Osh. The rest is not doable. Another big aspect is the code integrity. As js files get downloaded from the server. They can switch at any point. Hijacked. Your keys and communications can be compromised. We felt that Js is getting there but it is not there yet for our needs. However, there are some really solid Js crypto apps out there. Cryptocat and minilock by Na jdim. You should follow along with him and try out his apps. They are really great. He is making a ton of progress in that direction. Back to our approach of what we built. Browser based apps. It runs in a browser. We also have this idea of local browser based apps. Have patience here. Imagine running an app on a local host. The rest of the world is like what I don't understand it. It is not a viable solution. I use browser to go to the internet. What we are going for is this hybrid app. A python backend and Html5 frontend. That people interact with zozer Native installers from Mac Os and Windows. Zoz and Native integration like toolbar and tray. You can install it easily. It spins up a browser instance. When you are ready to access it. You might be shaking your heads. Okay. Wait, this guy, what are you talking about? There is a lot of good reasons we want to experiment with this. One thing is the larger talent pool. In web versus native revelopers is 68%. I'm getting the statistics from Github. And I realise it is not exact numbers. Some web apps are in Java. And some are in Python. The difference is why I'm saying it is a webapp. Not using a native. Like QT or something else. There is a lot of deployment options. deploy to your local computer or the server. And access it over the network. As long is it is securely zozer You get a ton of benefits. Your interface can respond and adapt to whatever device. As developers of that. One real interface logic. We don't have to have multiple ones in different languages. Then the question is, where is the crypto going to happen? Why makes it secure? Imagine we have the Html frontend. Data interacts with the application. That gets send to a python backend. Or from templates. And it talks to a Binary and passes it back. The frontend code never really interacts with any of the mission critical crypto things like private keys. Which is a huge security gain. The Gnupg has been a long time. And a ton of eyes on it. It is not some sort of bleeding edge thing that is likely to expose somebody's safety. However, it does happen, even with these projects. The security committee feels, use things like that. And you are better off. Front-end developers. We never have to touch crypto code. You don't need to learn about it. And compromise your own privacy. You didn't understand the right place to pass. The right variable, whatever. That leaks your data of the key. Another benefit of building apps with this style is that your backend developers can access and interact with many other parts of the system. To do more secure anonimous requests zozer You couldn't do that in browser app. And Gpg tools is another desktop Pgp app. If you need power user features, the Api's will still hook and interact. You'll be able to share the same keys. As well as Gpg tools. There is this rising trend. That there are these local browser based apps. We are not the only ones doing this thing. Tagspaces is cool. How to describe it. To organize your files on your computer. It gives much more interesting power user way of sharing, archiving them. Novocut is a collaborative film. And Metapolator. I believe python. Novacut is phython. And Tagspaces is in... They are interested in that. 2 of the 3 are written with backends. Javascript is perfect. Create amazingly usable frech interfaces. That's what Pgp needs. When I got involved with it. You are a de signer. Pgp is this drag into... Depend who you talk to. This is the problem. No, the fingerprint. It goes on and on on. I think, I have a theory why it is such a nightmare. I'll get to that in a few more slides. A year ago I created by first Pgp key. How many have you created a Pgp key key? How many use them? Okay. How many you feel confident you understand Pgp. Maybe 5 people that did the last round. That's good. The first key I created I can't use anymore. I delited the private one. One of my friends is a 1024. And Wait, like, that must be bad. Sure enough, one of my friends said, it is bad. The users should not be thinking about this. It is the culture of the people who have been building software for all these years. They don't think about it. And then there is actions. Send me your public key. You have this big block of text. You are supposed to email it. There is not a clear way of doing it. It gets sent wrong. Or you encrypt it. It leaves you feeling frustrated. Interfaces look like this. This is the view. They are awesome guys and collaborating with them. To share icons. And It is a unified user experience. Here is an example of a keychain. It is this really boring tabular list. Okay, I think I understand. And here is what we are going for. A social networking sort of experience of people. It is about people. We don't have, the keychain has dipsappeared. Being a frontend developer. What does it mean to a user? As a frontend person or persons in this room, it is the sort of thing we can bring to the old school applications in local context. There is more than crypto. Fixing older experiences from web development standpoint can be interesting. A rest Api. Standard issue you are used to interacting with. That enables us to do a lot of interesting things. Build plugins. These columns of emails. It is interesting and new and fresh. Here is another example. Using the 3D library. That's my sociograph. If I do Js I get a different sociograph. The next level is to build and interact with it. It is interesting. Instead of a traditional email list. We have a commandline interface. We are going to expose through pipes. How to interact with email data zozer One of the big things we care about is decentralizing the web. Instead of these large entities where everything is a webserver by a big company. Let's reexpose the local host and computer and have it accessible. Through Pagekite. Or Tor. I can expose my laptop and anybody could access it. When you do that, local becomes a server. Your email could live on your private computer. You could punch through the net. And access it from the nobile devices. And you don't have to trust third parties. That's what it was in the 90s. It went in the other direction. The tools are out there and we can work towards it. There is a demo online. If you find this project interesting. And you want to explore, what a new approach to email looks like. We have it in different languages. We released the beta. You are the first who know about it. We like you have it download it. Suggest dream features. Anything you want to improve. I'm Brennan Novak. My key is in that QR code. if you are into that. Thank you very much. (applause)

Features

In the default setup of the program, the user is given a public and a private PGP key, for the purpose of (respectively) receiving encrypted email and then decrypting it.[7] Mailpile uses PGP and stores all locally generated files in encrypted form on-disk. The client takes an opportunistic approach to finding other users to encrypt to, those that support it, and integrates this in the process of sending email.

The program preloads a lot of email data into RAM to accelerate search results. While the search results remain really fast despite large amounts of emails, this gradually slows down the start-up time of the program as stored email data increases. This feature will likely be altered in the planned Mailpile version 2.[8]

History

Mailpile started out as a search engine in 2011.[1]

Crowdfunding

The project gained recognition following an Indiegogo crowdfunding campaign, raising $163,192 between August and September 2013.[9][10] In the middle of the campaign, PayPal froze a large portion of the raised funds, and subsequently released them after Mailpile took the issue to the public on blogs and social media platforms including Twitter.[11][12]

Releases

Alpha

The first publicly tagged release 0.1.0[13] from January 2014 included an original typeface (also by the name of "Mailpile"), UI feedback of encryption and signatures, custom search engine, integrated spam-filtering support, and localization to around 30 languages.[14]

Alpha II

July 2014 This release introduced storing logs encrypted, partial native IMAP support, and the spam filtering engine gained more ways to auto-classify e-mail. The graphical interface was revamped. A wizard was introduced to help users with account setup.[15]

Beta

Mailpile released a beta version in September 2014.[16][17]

Beta II

January 2015 1024 bit keys were no longer being generated, in favour of stronger, 4096 bit PGP keys.[18]

Beta III

July 2015[19]

Release Candidate

A preliminary version of the 1.0 version was released on 13 August at the Dutch SHA2017 Hacker Camp, where the main developer gave a talk about the project.[20]

Notes

  1. ^ AGPL-3.0-or-later or Apache-2.0+

References

  1. ^ Finley, Klint (August 26, 2013). "Open Sourcers Pitch Secure Email in Dark Age of PRISM". Wired. Retrieved March 8, 2014.
  2. ^ "Mailpile.is". Mailpile Team. Retrieved 2014-02-21.
  3. ^ Mailpile Team (13 September 2014). "One Year Later: Mailpile Beta". Mailpile Blog. Retrieved 29 September 2014.
  4. ^ "Releases - mailpile/Mailpile". Retrieved 29 June 2020 – via GitHub.
  5. ^ "Mailpile translation statistics". mailpile.is. 1 September 2014. Retrieved 2014-09-13.
  6. ^ "Licensing AGPLv3". GitHub. Retrieved 8 September 2015.
  7. ^ Finley, Klint (3 September 2014). "The Open Source Tool That Lets You Send Encrypted Emails to Anyone". Wired. Retrieved 29 September 2014.
  8. ^ A very uninformative progress update: Mailpile 2?
  9. ^ Lomas, Natasha (20 August 2013). "Mailpile Is A Pro-Privacy, Open Source Webmail Project That's Raised ~$100,000 On Indiegogo". TechCrunch. Retrieved 29 September 2014.
  10. ^ "Mailpile - taking e-mail back". IndieGoGo. Retrieved 29 September 2014.
  11. ^ Hutchinson, Lee (5 September 2013). "PayPal freezes $45,000 of Mailpile's crowdfunded dollars". ArsTechnica. Retrieved 29 September 2014.
  12. ^ Masnick, Mike (5 September 2013). "Insanity: PayPal Freezes Mailpile's Account, Demands Excessive Info To Get Access". TechDirt. Retrieved 29 September 2014.
  13. ^ Release Notes 201401 Alpha, GitHub, 1 February 2014
  14. ^ Mailpile Team (1 February 2014). "Alpha Release: Shipping Bits and Atoms". Mailpile Blog. Retrieved 21 February 2014.
  15. ^ Release Notes 201406 Alpha II, GitHub, 3 July 2014
  16. ^ Release Notes 201409 Beta, GitHub, 30 September 2014
  17. ^ Hutchinson, Lee (15 September 2014). "Mailpile enters beta—It's like Gmail, but you run it on your own computer". Ars Technica. Retrieved 29 September 2014.
  18. ^ Release Notes 201501 Beta II, GitHub, 20 January 2015
  19. ^ Release Notes 201507 Beta III, GitHub, 2 May 2017
  20. ^ Bjarni Rúnar: Mailpile: Still Hacking Anyway, mailpile : blog, 13 August 2017

External links

This page was last edited on 8 June 2023, at 23:43
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.