Security

How we keep your mail private — and what we'd do if asked to hand it over

This page is plain about the parts of email that aren't private and what we've built around them. We don't oversell the encryption story.

What we protect, in plain terms

Email is fundamentally a 1980s protocol grafted onto the modern internet. Some parts of a message can be encrypted in ways that even we can't read; other parts (subjects, recipients, timing) can't, because the email system itself needs them in cleartext to route. We're honest about which parts are which.

Encrypted so even we can't read it

Visible to us if we look hard, and to anyone with a court order

We never store

Where the servers live

Mailcedar runs on bare-metal servers we own and rack ourselves, hosted by iWeb in Montréal, Québec. We chose Canadian data centres specifically because Canadian privacy law (PIPEDA) is reasonably consumer-protective and the data stays under one jurisdiction.

We don't use Amazon, Google, or Microsoft for the mail path. That means we're slower than them at adopting fancy ML features and faster at fixing things ourselves when they break.

Standards we implement

SPF, DKIM, DMARCRequired for inbound; configured for all outbound. DMARC reports published quarterly.
MTA-STS & TLS-RPTBoth published; our policies are enforce.
DANE TLSAPublished for inbound MX.
TLS1.3 preferred, 1.2 minimum. ECDSA P-256 + RSA-2048 dual-stack.
WebAuthn / FIDO2Supported for sign-in and step-up.
OpenPGPWeb Key Directory publishing. PGP key discovery for outbound.
JMAPRead-only public API. Modern alternative to IMAP for developers.

Independent review

We engage Cure53 for an annual web app and protocol audit. The most recent report (October 2025) is available to enterprise customers under NDA. Summary findings are published as a blog post six weeks after each audit cycle.

We don't claim SOC 2 because we don't believe a certificate from a paid auditor tells you what you actually want to know about a small mail company. We'd rather you read the audit reports.

We comply with valid Canadian legal process. We push back on overbroad orders, gag orders that prevent notifying you, and any request from a foreign jurisdiction that doesn't come through MLAT.

Our position:

Warrant canary

As of the most recent quarterly statement (signed and timestamped on April 1, 2026), Mailcedar has not:

The next signed canary is published on July 1, 2026. The PGP-signed statement and our public key live at /canary.txt on this domain.

Found a security bug?

Email security@mailcedar.com with details. PGP key at /security-pgp.asc. We respond within two business days. Bounty range $200–$15,000 depending on severity; we publish our scope and out-of-scope list at /.well-known/security.txt.

Account closure and data deletion

If you close your account, we permanently delete all your mail within 30 days. Backups age out within 60 more days. After 90 days from closure there is nothing left of your account on our systems — not the username, not the metadata, not the encrypted blobs. We tested this. We can prove it.

A quieter inbox starts here

5 GB free, no card, no commitment. Export anytime.

Create your address