FAQ's

If you have a question that’s not answered below, please email us.

  • p≡p Overview

    • What is p≡p?

      pretty Easy privacy (abbreviated as p≡p) is a cyber security solution which protects the confidentiality and reliability of communications for citizens, for public offices and for enterprises. It provides end-to-end cryptography through software that you install on your desktop or your tablet or your phone.

    • Why should I use p≡p?

      p≡p ensures that no one can intercept or read your digital text-based communication, thereby dramatically reducing the risk of identity theft and fraud.
    • What makes p≡p different from other security and privacy solutions?

      p≡p has a unique position in the market because:

      • It will work with any existing email and messaging system, including SMS text,

      • It is easy to use without any compromise in security or privacy,

      • It is privacy by default!

    • When you say p≡p is easy to use, what does that really mean?

      p≡p is easy to install and easy to understand and it does not require any user interaction for its basic operation. Importantly p≡p never puts communicating securely over the ability to communicate, so for example if no secure communication channel can be established between two peers, the communication is sent unsecurely rather than hassling the users involved. p≡p has been designed for all users not just power users.

    • When you say p≡p is privacy by default, what does that really mean?

      p≡p’s default is to automatically encrypt and anonymize your communication, and it both encourages and then helps you to further verify who you are communicating with. Overall p≡p is about changing today's default of digital text-based communications from unencrypted, unanonymized and unverified to encrypted, anonymized and verified.

    • When will p≡p be available?

      p≡p is currently available for Outlook on the PC and Android tablets and phones. In 2018 there will be releases for Enigemail/p≡p and p≡p for iOS. These first releases will encrypt and verify email only. Later will follow releases which include anonymization.

    • Where can I buy p≡p?

      A p≡p for Outlook subscription is available from our online store and the p≡p mobile applications are available from the Apple App Store and from Google Play. For businesses the p≡p mobile applications are also available from Apples Volume Purchase Program and from Google Play for Work. If your business has more than 500 users then a p≡p Enterprise Subscription is available here

    • How much does p≡p cost?

      p≡p costs less than your yearly budget for envelopes and stamps, yet achieves significantly more for your privacy.

      Please consult our p≡p online shop to find out current p≡p for Outlook subscription costs. Please refer to either the App Store or Google Play Store to find out p≡p mobile app pricing. Please click on Enquire if you would like to receive a quote for your p≡p Enterprise Subscription (unlimited devices per user per year).

  • p≡p and my Privacy

    • How can I be sure that p≡p does not have any back doors?

      All our code is open source and so anyone can download the source code and check for backdoors or vulnerabilities in the software. In addition we pay independent security experts to do code reviews of our software and their results are published and can be reviewed too.
    • Where can I get access to your source code?

      The p≡p source code is available here and you are free to download it at any time.

    • Do you log my activity?

      Here at p≡p we do not log your activity, indeed since p≡p is only device based and hence peer to peer there is no central infrastructure through which we could log your activities even if we wanted to!
    • Does p≡p prevent governments from seeing my email and messages?

      Yes, assuming that you have not given them access to your private key. In order to see your emails a government would have to target you and gain access to your device (e.g. with a warrant or by hacking the device itself).
    • What do you do when you receive a request from a government or a court to hand over mine or another user keys or emails or messages?

      We have not had any requests so far and so we would be breaking new ground with our first one. However, since p≡p is device based and peer to peer, we have no central infrastructure or servers and so only you have your keys and therefore only you can read your communications, not even p≡p. So we have nothing we could hand over about you or any of our users. It is possible to buy p≡p fully anonymized, we will also support anoynymous cryptocurrencies, at the moment we handle such a payments per customer.

    • Yes, but would you tell me still when there are requests from a governments or a court to hand over mine or another user keys or emails or messages?

      You see the p≡p Company, like all technology companies, may face certain legal restrictions as to how transparent we can be to our users about these requests. We will share as much as legally possible about these requests. It is important to remember though that p≡p stores neither user keys nor user data that we could hand over. 

    • Why is anonymizing my emails and messages, and protecting my metadata important?

      Please see this short video by Privacy International explaining what metadata is and why we think it is important to protect:

  • How p≡p works (User view)

    • How do I set up p≡p on my desktop?

      When the p≡p software is added to your existing e-mail client (e. g. Outlook for Windows or Thunderbird for Windows/Mac/Linux) it automatically configures itself to work with your existing email accounts. If you subsequently add new accounts, then p≡p will automatically work with them too. Even though it’s discouraged for regular users, of course power users remain free to configure their installation by themselves and turn off the automation proposed by p≡p.
    • How do I set up p≡p on my mobile device?

      When p≡p is downloaded to your mobile device your existing email and messaging accounts need to be added to the p≡p mobile application for p≡p to work with them. If you subsequently add new accounts, then these will need to be added to the p≡p mobile application for p≡p to work with them. All other elements of the p≡p setup are automatic, although power users remain free to configure their installation by themselves and turn off the automation proposed by p≡p.
    • What happens if I am already using a security solution?

      p≡p will automatically integrate with any existing security solution you have. For example if you already have OpenPGP keys, then p≡p will just use them for any further communication.
    • What happens if I have S/MIME installed related to my work?

      p≡p will recognize S/MIME automatically and you can continue working seamlessly.
    • What happens when I have my S/MIME Key on a Smartcard?

      Any smartcard recognition is done by the mail client which p≡p plugs into so when p≡p want to send something encrypted your mail client will ask for the smartcard to be plugged in just as you are used to.
    • What happens when I change my job if I do not have S/MIME infrastructure anymore?

      If you lose access to your S/MIME Certificate, then p≡p will not be able to encrypt your emails to contacts who do not have p≡p or PGP installed. Also your encrypted company mails stored locally will not be readable for you anymore since p≡p cannot decrypt them without your S/MIME Certificate. Importantly p≡p handles your private and your business messaging separately and all aspects of your non work email will be unaffected.
    • What happens if I am an existing PGP user and I install p≡p?

      If you are an existing PGP user, then p≡p will find your existing PGP installation and use it automatically.
    • What happens if I have a passphrase for my PGP private Key to unlock?

      If you have a passphrase for your PGP private Key to unlock, then p≡p will ask for the passphrase and, assuming that your keys are saved to a crypto container, p≡p will suggest that you remove the passphrase because with p≡p there really is no need for it.

    • What happens if my p≡p keys expire?

      p≡p will automatically renew your expired key(s). The OpenPGP users will then have to import this renewed key in order to continue to communicate with you securely.

    • When I am using p≡p how does it change how I write and send emails and messages?

      When using p≡p you can just send your emails and messages in just the same way as you did before! For its basic operation p≡p does not require any user interaction, p≡p will automatically find the most secure way of communicating for you.
    • When I am using p≡p how does it change how I read the emails and messages I receive?

      When using p≡p you just read your emails and messages in just the same way as you did before! p≡p automatically decrypt the secure emails and secure messages that are sent to you.
    • Can I still read the secure emails and messages I send?

      p≡p will always store the secure messages you've sent so you can read them later. Just like received messages, sent messages will be stored securely (encrypted) for untrusted accounts and unencrypted if you trust the account (configurable in options).

    • How do I know how secure a communication is before I send it, or was when I receive it?

      p≡p displays the Privacy Status at the bottom of all outgoing and incoming emails and messages. p≡p uses a traffic lights metaphor, extended by the fallback to gray, to indicate the Privacy Status, along with statements which are directly linked to how secure the available communication channel is or was.
    • What is the full set of statements used to indicate the Privacy Status?

      The full set of Privacy Status’ are:

      • Gray/Unknown/Unsecure/Unreliable Security

      • Unknown is commonly for outgoing messages where no contact or address has yet been added to the To, Cc or Bcc fields of an email or message.
      • Unsecure or Unsecure for Some means that p≡p cannot find a way of sending or receiving the communication with any form of encryption (to all recipients if Unsecure for Some). This represents the default situation today which, in the case of email, usually must be considered as “secure” as sending a physical post card.
      • Unreliable means that p≡p cannot find a way of sending or receiving the communication reliably. So, for example, the communication could have been sent using S/MIME. With S/MIME it's known that if one public Certificate Authority (CA) is subverted then the security of the entire system is lost — potentially subverting all the entities that trust the compromised CA.

      • Yellow/Secure:

      • The communication is encrypted using state-of-the-art technology. However, your communication partner still needs to be trusted by completing a handshake.

      • Green/Secure & Trusted:

      • The communication is encrypted using state-of-the-art technology and your communication partner is trusted. Trust is confirmed with a handshake where, using a side-channel (e. g. by phone call), communication partners verify they are each who they say they are and the communication can be fully trusted by all reasonable means expected from a regular user.

      • Red/Mistrusted, Under Attack:

      • Mistrusted means that you have previously failed a handshake. You cannot trust that your communication partner is who they say they are.
      • Under Attack means that either a man-in-the-middle (MITM) attack has to be assumed or another (serious) cryptographic error occurred. The communication channel must be considered unsecure and any exchanged information not private.
    • What happens if p≡p can only send a communication Gray/Unsecure or Gray/Unreliable and I want to send it Yellow/Secure?

      There are two scenarios through which Yellow/Secure can be established:

      1. If this is the first time that you have communicated with the recipient, then it may be possible that p≡p could send an encrypted communication but only after your first communication has taken place (so called Trust On First Use or TOFU). In this case there is a need to first send a non-sensitive communication to the recipient and see if the Privacy Status of their reply comes back encrypted by default.

      2. If this is not the case, then there is a need to Force Encryption of the communication and this is done with the use of a button at the header of the email or message. Forcing Encryption will send the communication encrypted regardless of the Privacy Status and in this case the recipient is notified that they have received an encrypted email or message from you and they have to follow a link to where they can download a free p≡p Reader for Outlook or purchase p≡p for iOS or p≡p for Android.

    • Tell me more about the p≡p Reader for Outlook?

      The p≡p Reader for Outlook allows the recipient to read an incoming encrypted email or message but not reply to them. In order to send (and hence reply) to encrypted email or message a full p≡p for Outlook subscription is required.
    • How do I verify a communication and advance the Privacy Status from Yellow/Secure to Green/Secure & Trusted?

      To establish a Green/Secure & Trusted communication channel you need to first side-channel (e. g. a phone call) to verify that your peer is who they say they are and verify to your peer that you are who you say you are. As a p≡p user you complete a metaphorical) “Handshake” by selecting the Yellow/Secure Privacy Status icon on the email or message.

    • What does the “Handshake” involve?

      If the other person is also a p≡p user, then your handshake is made easier by the fact that you can both simply divulging you own p≡p Trustwords which p≡p prompts you with. If the other person's p≡p Trustwords match the ones p≡p is showing you that they should have and vice versa, then the both users can confirm this in the dialogue box and the Privacy Status will switch to Green/Secure & Trusted for all future communication with that user. If the other user does not have p≡p, then you each have to divulge your own 40 digit hexadecimal PGP Finger Prints, which p≡p also prompts you with.

    • What are p≡p Trustwords?

      p≡p generates 5 Trustwords for you in the language of your choice. For example CAR HORSE BATTERY STAPLE APPLE. Your p≡p Trustwords are unique and they allow you to confirm your identify to other p≡p users.

    • What happens if p≡p can send an email or a message Yellow/Encrypted or Green/Secure & Trusted but I actually want to send it unencrypted?

      With p≡p you always have the option to send an email or a message unencrypted regardless of the Privacy Status. This is done by selecting the Disable Protection option at the header of the email or the message.

    • Does p≡p ever stop me from sending an email or a message?

      No, p≡p will always let you send an email or a message, regardless of the Privacy Status, even if it is Red/Under Attack.
    • What Privacy Status is shown if I am sending an email or a message to multiple people?

      The Privacy Status will always reflect the least secure communication across all of the intended recipients. There are in fact further variations in the actual Privacy Status statements which notify you of this e.g. Unsecure For Some is used rather than just Unsecure.

    • How do I know the actual Privacy Status for each recipient?

      You can see the Privacy Status of individual recipients by selecting the Privacy Status box. This pop up window also allows you to manage the Privacy Status of individual recipient, e.g. you can Stop Trusting a recipient who is Green/Secure & Trusted or initiate a Handshake with a recipient who is Yellow/Secure etc.

    • Can I now send secure and private communications from my other devices?

      You need p≡p on each of your devices in order to send secure and private communication.
    • Can I receive secure and private communication on my other devices?

      While you can receive secure email and messages on devices without p≡p on them you will not be able to read them. So in reality you need p≡p on each devices you use to access your email and messages from.
    • Are there any complexities with having p≡p on more than one of my devices?

      p≡p is designed to work across all of your devices and it does this by automatically detecting any other devices associated with your email or messaging accounts which is also running p≡p. When p≡p detects such a device, it prompts you to add that device to your p≡p Device Group, which you can do by verifying the p≡p Trustwords associated with both devices.

    • How does p≡p store your secure emails?

      p≡p gives you the option to store your email securely or unsecurely. If you trust your email provider and their servers, then you are advised to have p≡p store your email unsecurely. If you do not trust your email provider or their servers, then you are advised to have p≡p store your email securely. The default setting for p≡p for Outlook is to store email unsecurely and for p≡p for iOS and p≡p for Android it is to store them securely. These default settings can be changed by the user for each of his/her email accounts.

    • Is it possible to communicate with a Health Info Net (HIN) Swiss service?

      We are working on support for HIN, it will be released in the future.

  • How p≡p works (Technical view)

    • What does p≡p do and how?

      p≡p encrypts and anonymizes your emails and messages, including your SMS Text, and it does this automatically and by default. p≡p also offers you a way to easily verify your communications. p≡p is end-to-end and peer to peer, there is no central infrastructure and no way for anyone, not even p≡p, to read your communication.
    • What security standards does p≡p support?

      p≡p supports many different encryption protocols (S/MIME, OpenPGP, OTR …) and in the case of S/MIME and OpenPGP it removes their weaknesses, both in p≡p to S/MIME and p≡p to OpenPGP communications and then further in p≡p to p≡p communication. For example in the case of p≡p to S/MIME or p≡p to OpenPGP communication p≡p also:

      • Encrypts the subject of the communication by moving it into the body of the email or message.

      • Removes the opportunity for an attacker to switch the header on an encrypted and signed email/message, and all he attack vectors which rely on that.

      • Anonymizes the communication should an anonymizing platform be available.

       

      For example in the case of a p≡p to p≡p communication p≡p also:

      • Encrypts the entire header content so that only the envelope remains unencrypted.

      • Anonymizes the communication.

      • Removes the opportunity for an attacker to monitor the PGP public key server to learn about all the keys the user downloads.

      • Removes the opportunity for an attacker to monitor the sending of unencrypted PGP public keys by sending them encrypted and signed.

    • How does p≡p select the most secure way of sending an email or a message?

      When a p≡p user is communicating with another p≡p user:

      1. if online communication available: OTR through GNUnet.

      2. if online communication not available:

      a. if anonymizing platform available, OpenPGP through anonymizing platform (i.e. Qabel),

      b. if anonymizing platform not available, fallback to OpenPGP.

      When a p≡p user is communicating with a non-p≡p user then depending on the capabilities of the non-p≡p user:

      1. if anonymizing and forward secrecy is possible, use that (i.e. OTR over GNUnet).

      2. if anonymizing but no forward secrecy is possible, use that (i.e. OpenPGP over Qabel).

      3. if forward secrecy is possible, use that (i.e. OTR).

      4. if hard cryptography but no forward secrecy is possible, use that (i.e. OpenPGP)

      5. if only weak cryptography is possible, use that (i.e. S/MIME with commercial CAs)

      6. send unencrypted.

    • How should I think about p≡p’s Trust Management model?

      p≡p’s Trust Management model is new and innovative and it uniquely matches privacy with empowerment.
    • What is p≡p’s Trust Management model?

      p≡p manages the Trust between the actual p≡p user and their key, so the p≡p User ID is associated with the actual human and the Trust Model is that this actual human being is actually using this key. So p≡p’s Trust Management model is very different from OpenPGP (where the User ID is associated with an email ID) and the p≡p user can use the same key on all of their channels as p≡p (rightly) just thinks of their accounts as different ways that this same human being appears on the internet.

      There are a number of additional benefits associated with p≡p Trust Management model:

      • Once trust is validate on one channel then it is validated on all channels.

      • If p≡p receives a new key from a user it trusts and on a trustworthy channel, then p≡p can move that trust to this new key. This benefit will become even more important when p≡p supports annonymization over OTR (and hence forward secrecy) as new keys can then be distribute and even if you get the old key later on you cannot decrypt the old message. In this case p≡p’s Trust Management model is adapting to perfect forward secrecy and OpenPGP has no solution for this.

    • Does p≡p’s Trust Management model allow for me to have a pseudonym?

      p≡p Trust Management model does support you having a second identity on the internet where no one can detect that it is actually you. p≡p does this by attaching a new key to your new identity. So you decide to create a truly new identity, not just new email or messaging accounts, and p≡p will spot that and give you a new key and allows you to keep in full control of how you appear on the internet. p≡p also supports the scenario where you may in fact want to to be associated with your pseudonym if both are stored in the one single contact in outlook, for example. So p≡p empowers the user to truly decide how they want to appear on the internet and if the user knows what others are doing also then again p≡p users are empowered and are able to manage that.
    • Why does p≡p only have one level of trust?

      p≡p only has one level for trust (Green/Secure & Trusted) as this is all that is needed and this has the added benefit of making it easy for users to understand. X/500, S/MIME and OpenPGP on the other hand all have complex trust systems for different levels of trust, and very few users really know the differences. This represents a shortcoming in the design of these systems as trust is something that only a human being, the user, can and should be deciding, not something that can be left to the technology.

    • How should I think about p≡p’s Key Management model?

      p≡p’s Key Management model is new and innovative and industry leading.

    • What is p≡p’s Key Management model?

      p≡p manually check trust on a peer-to-peer basis and it does this against the first key from the other user, or until that key is invalid or it expires or it is rejected. So p≡p does not automatically Trust On First Use (TOFU), we get a Yellow/Encrypted Privacy Status never a Green/Secure & Trusted, but rather it is more or less key on first use, or more correctly key pinning on first use.

    • What happens if a user sends me a new key before I have manually checked trust?

      If p≡p receives a second key from the same person, then the second key is stored and it is used to decrypt but it is never used to send messages out, there p≡p continues to use the original key until this key is invalid or it expires or it is rejected.
    • What advantages are associated with p≡p’s Key Management model?

      The advantages of p≡p’s Key Management model are:

      • Since it is peer-to-peer there is no dependency on a central key store or Certificate Authorities CA, thereby reducing the number of vulnerabilities considerably. In the case of central key stores p≡p does supports the OpenPGP key server but this is purely for compatibility reasons and the default is for it to be turned off. Similarly for compatibility reasons p≡p does supports CA’s but in the case of public CA’s it will flag the Privacy Status of such communications as Gray/Unreliable since if one single public CA is not trustworthy then the whole system breaks down.

      • Since it is not true TOFU it avoids the false sense of security which comes as a result of doing nothing, you may well end up trusting the wrong thing. With p≡p all you have to do is verify p≡p Trustwords and then you know, with good reason, to trust. Trusting by default is not good in any case.

      • Since it is not true certificate pinning p≡p avoids the false sense of security that alerts will stop an attack. Since alerts associated with a change in trust are often false positives users tend to ignore them and would do similar in the case of a real attack.

    • Does p≡p encrypt the subject line of my email or message?

      p≡p always encrypts the subject line of any email or message it sends and it does this by putting it in the body of the email or message. If this is a p≡p to p≡p communication then this is transparent to both p≡p users. If the recipient is an S/MIME or OpenPGP user then the subject line will be displayed as p≡p and the real subject line will be visible in the body of the decrypted email or message. This feature can be switched off by the user in p≡p for Outlook via File>p≡p>Accounts>Account Encryption>Check Enable unencrypted message subjects.

    • What is being synchronized within a p≡p Device Group?

      p≡p automatically and securely synchronizes the keys and in later versions the trust associated with each contact between all devices within a p≡p Device Group without a cloud and/or central server. If one of the devices is a Windows PC running p≡p for Outlook then there is an option to also synchronize the p≡p for Outlook configuration to the other devices. Future versions of p≡p will also synchronize contacts and calendars/schedules too. Key sync is implemented from versions of p≡p for Outlook 1.1,  p≡p for Android 1. and  p≡p for iOS 1.

    • How are the p≡p Trustwords generated and is comparing them as reliable as comparing PGP Fingerprints?

      The p≡p Trustwords, like a PGP Fingerprint, are generated from the keys p≡p is using (which are at least 2048 bit, maybe 4096 bit, RSA keys). The p≡p Trustwords are guaranteed to have at least 64 bits of entropy associated with them, and while this is less than the 160 bits associated with a PGP Fingerprint, it is most likely that users will fully compare their p≡p Trustwords rather than only comparing a small part of the more complex PGP Fingerprint which is typical. So in practice we believe that comparing p≡p Trustwords is in fact more reliable than comparing PGP Fingerprints.
  • p≡p for Outlook

    • When will p≡p for Outlook be available?

      p≡p for Outlook is available since Q2 2016. These first releases encrypts and verifies email only. A follow on release which includes anonymization and messaging will be available in 2019.

    • Which Versions of Outlook does p≡p support?

      p≡p for Outlook works with Outlook 2010, Outlook 2013 and Outlook 2016 releases for Windows, in their 32 bit and the 64 bit versions.
    • Where can I buy p≡p for Outlook?

      p≡p for Outlook is available from our online store

    • How much does p≡p for Outlook cost?

      Please consult our p≡p online store to find out p≡p for Outlook subscription cost.

    • How many PC's does my p≡p for Outlook subscription cover?

      A p≡p for Outlook subscription is required for each of your PC’s.
    • Why is p≡p for Outlook only available as a subscription?

      The only way that p≡p can continue to protect your communication is if the software is always up to date. Also it is important that the Privacy Status accurately reflects the latest known vectors of attack.
    • How do I get updates to p≡p for Outlook?

      If you have a valid subscription, then you will be informed when updates of p≡p for Outlook are available. Once accepted the update it will self-install on your PC.

    • Will p≡p for Outlook still work if my subscription expires?

      You will be able to read all incoming emails and messages, and see their Privacy Status. You will only be able to send emails and messages Gray/Unsecure, regardless of the Privacy Status, until you renew your subscription.

    • How do I renew my p≡p for Outlook Subscription?

      You will be notified by the p≡p online shop via e-mail 15 days prior to the end of the term of your subscription.
    • How do I add my PC running p≡p for Outlook to a Device Group?

      p≡p for Outlook will automatically detect if you have any other devices running p≡p and you will be prompted if you want to create a p≡p Device Group. To add p≡p for Outlook to the p≡p Device Group simply confirm that the p≡p Trustwords associated with both devices are identical and select the “Add” button. However key sync is not yet implemented in current versions of p≡p.

    • Do I need to back up the security keys p≡p has allocated and is managing for me?

      There is only a need to back up your keys if you are not part of a p≡p Device Group, as another device in p≡p Device Group will always have your keys. Also your keys will be backed up as part of any normal systems backup you have in place. If however you do want to backup your keys directly, since p≡p stores your keys in GnuPG Keyring(s) you can use the documentation of GnuPG to do this.

    • What happens if I need to re-install p≡p for Outlook on my PC?

      You can revisit and login to our online store and go to "Order History", click on view and then click "Download". If you bought p≡p for Outlook using anonymous payment, then please contact us by email at support@prettyeasyprivacy.com

    • What happens when I re-install p≡p for Outlook on my PC?

      • If your Outlook PC was part of a p≡p Device Group, then your existing security keys will automatically be synchronized back to your Outlook PC and everything will be back to how it was before you re-installed p≡p for Outlook.

      • If your Outlook PC was not part of a p≡p Device Group and you have a backup of your existing security keys, then you can restore your previous keys and everything will be back to how it was before you re-installed p≡p for Outlook.

      • If your Outlook PC was not part of a p≡p Device Group and you do not have a backup of your existing security keys, then you will now be using the new key pair which will have one, maybe two implications:

      1. In all cases p≡p will automatically share your new Public Key with all the people you communicate with when you send them an email or a message. You will have to re-establish Secure Privacy Status by handshaking with individual contacts.
      2. If you had opted to store your emails encrypted with your provider then you will not be able to read your previously encrypted ones.
    • What support do you offer for the p≡p for Outlook?

      All support for p≡p for Outlook is linked to a valid subscription and is via e-mail to support@prettyeasyprivacy.com

    • What is the easiest way for me to send you details about any issues I am having with p≡p for Outlook?

      If there is a serious issue with p≡p for Outlook, then a pop-up window will give you the option to send us the crash log via an automatic email. Importantly there is no exchange of your private security key associated with this process. You can also send us screenshot of an issue via email to support@prettyeasyprivacy.com

    • How do I uninstall p≡p for Outlook?

      To uninstall p≡p for Outlook go to the Windows Control Panel and open the Software and Features dialog. Click p≡p for Outlook in the list of applications and click on uninstall.
    • After I have uninstalled p≡p for Outlook what are the implications?

      Once you have uninstalled p≡p for Outlook if you had opted to store your emails encrypted with your provider, then you will only be able to read your previously encrypted emails on another device with p≡p installed or any other PGP solution, and assuming that you restored your previous security keys.

  • Enigmail/p≡p

    • What is Enigmail/p≡p?

      Enigmail/p≡p is a future release of Enigmail that includes p≡p, making it easy to send and receiving encrypted and anonymized email.
    • When will Enigmail/p≡p be available?

      Enigmail/p≡p is available since March 2018 (Enigmail version 2.0.0). The first releases will encrypt and verify email only and a follow on release which includes anonymization will be available in 2019.

    • Will p≡p be available for earlier versions of Enigmail as a plug-in?

      p≡p will not be available for earlier versions of Enigmail as Enigmail is a plugin itself and so it does not sport a plugin concept.

    • What applications does Enigmail work with?

      Enigmail works with Mozilla Thunderbird and SeaMonkey.

    • Where will I be able to download Enigmail/p≡p from?

      Enigmail/p≡p will be available from p≡p and from Enigmail

    • How much does p≡p for Enigmail cost?

      Enigmail/p≡p is free software.
    • How will I get updates to Enigmail/p≡p?

      Updates to Enigmail/p≡p will come directly from Thunderbird or SeaMonkey or from Mozilla's plugin directory.
    • How do I add my PC or my Mac running Enigmail/p≡p to a Device Group?

      Enigmail/p≡p will automatically detect if you have any other devices running p≡p and it you will be prompted if you want to create a p≡p Device Group. To add Enigmail/p≡p to the p≡p Device Group simply confirm that the p≡p Trustwords associated with both devices are identical and select the “Add” button. However key sync is not yet implemented in current versions of p≡p.

    • Do I need to back up the security keys p≡p has allocated and is managing for me?

      There is only a need to back up your keys if you are not part of a p≡p Device Group, because another device in p≡p Device Group will always have your keys. Also your keys will be backed up as part of any normal systems backup you have in place. If however you do want to backup your keys directly, since p≡p stores your keys in GnuPG Keyring(s) you can use the documentation of GnuPG to do this.

    • What happens if I need to re-install Enigmail/p≡p on my PC or my Mac?

      Enigmail/p≡p can be re-downloaded from p≡p and from Enigmail

    • What happens when I re-install Enigmail/p≡p on my PC or my Mac?

      • If your PC or Mac was part of a p≡p Device Group, then your existing security keys will automatically be synchronized back to your new Enigmail/p≡p and everything will be back to how it was before you re-installed Enigmail/p≡p.

      • If your PC or Mac was not part of a p≡p Device Group and you have a backup of your existing security keys, then you can restore your previous keys and everything will be back to how it was before you re-installed Enigmail/p≡p.

      • If your PC or Mac was not part of a p≡p Device Group and you do not have a backup of your existing security keys, then you will now be using the new key pair which will have one, maybe two implications:

      1. In all cases p≡p will automatically share your new Public Key with all the people you communicate with when you send them emails and messages. You will have to re-establish Secure Privacy Status by handshaking with individual contacts again.

      2. If you had opted to store your email encrypted with your provider, then you will not be able to read your previously encrypted emails.

    • What support is available for Enigmail/p≡p?

      Support for Enigmail/p≡p will be provided by the volunteers through the usual means:

      • Subscribe to the mailing list.

      • Join the User & Support Forum.

      • Check the Frequently Asked Questions.

      • Check the commonly known problems with Enigmail.

      • Report a bug. Support will also be available from the p≡p Company via e-mail at support@prettyeasyprivacy.com

    • What is the easiest way for me to send you details about any issues I am having with Enigmail/p≡p?

      If there is a serious issue with Enigmail/p≡p, then a pop-up window will give you the option to send us the crash log via an automatic email, more importantly there is no exchange of your private security key associated with this process. You can also send us screenshot of an issue via email to support@prettyeasyprivacy.com

    • How will I uninstall Enigmail/p≡p from Thunderbird?

      To uninstall Enigmail/p≡p from Thunderbird:

      1. Go to Tools -> Extensions,

      2. Right-Click on Enigmail//p≡p,

      3. Choose Uninstall from the context menu and

      4. Restart Thunderbird.

    • After I have uninstalled Enigmail/p≡p what are the implications?

      If you had opted to store your email encrypted with your provider, then you will only be able to read your previously encrypted emails with another device with p≡p installed or any other PGP solution, and assuming that you restored your previous security keys.

  • p≡p Mobile

    • When will the p≡p mobile applications be available?

      The p≡p for Android mobile application is available in different android app markets including Play Store. These first releases will encrypt and verify email only and a follow on release which includes anonymization and messaging will be available later in 2019. p≡p for iOS will be available in Q3 2018.

    • Which Versions of the operating systems do the p≡p mobile applications support?

      p≡p for iOS requires iOS 9.0 or later and p≡p for Android works with Android 5.0 and later.

    • Where can I buy the p≡p mobile applications?

      p≡p for iOS and p≡p for Android are available from the Apple App Store and from Google Play respectively. For enterprises the p≡p mobile applications are also available from Apple's Volume Purchase Program and from Google Play for Work.

      If your enterprise has more than 500 users, then a p≡p Enterprise Subscription is available here

    • How much do the p≡p mobile applications cost?

      Please refer to the Apple App Store or the Google Play Store to find out the p≡p mobile app pricing.

    • Are there any restrictions on how many devices I can run p≡p mobile applications on?

      There are no restrictions on how many devices you can run p≡p mobile on.
    • If either of the p≡p mobile applications did not install properly on my device what should I do?

      Your device may not have enough free space to install p≡p.

      • To see the available space left for installing p≡p for iOS tap:

      Settings > General > Storage & iCloud Usage > Manage Storage

      • To see the available space left for installing p≡p for Android tap:

      Settings > SD Card & Device Storage

    • What happens when I install one of the p≡p mobile applications but have no email or messaging accounts configured?

      You need to have email and messaging accounts configured on your device for the p≡p mobile applications to work.

    • How do I get updates to the p≡p mobile applications?

      You will be notified by the app store you got your p≡p mobile applications from when there are updates and you can simply download the p≡p update.

    • How do I add my device running one of the p≡p mobile applications to a p≡p Device Group?

      Your p≡p mobile application will automatically detect if you have any other devices running p≡p and it you will be prompted if you want to create a p≡p Device Group. To add your p≡p mobile application to the p≡p Device Group simply confirm that the p≡p Trustwords associated with both devices are identical and select the “Add” button. Keysync feature is integrated in p≡p for Outlook since version 1.1 and in p≡p for Android since version 1.

    • Do I need to back up the security keys p≡p has allocated and is managing for me?

      There is really only a need to back up your keys if you are not part of a p≡p Device Group, as another device in p≡p Device Group will always have your keys. Also your keys will be backed up as part of any normal systems backup you have in place. If you do directly want to back up your keys, then:

      • For p≡p for iOS, your keys are stored in a file which p≡p has documented itself.

      • For p≡p for Android your keys are stored in GnuPG Keyring(s) and you can use the documentation of GnuPG

    • What happens if I need to re-install p≡p for iOS or p≡p for Android?

      When you download p≡p from either app store it is connected to your Apple or Goggle account. This means that you can reinstall the p≡p app to new or reset devices. So if you paid for a p≡p app, then you can reinstall it without paying for it again.
    • What happens when I re-install p≡p for iOS or p≡p for Android on my mobile device?

      The new p≡p installation will issue a new key pair for you to use. However:

      • If your mobile device was part of a p≡p Device Group, then your existing security keys will automatically be synchronized back to your mobile device and everything will be back to how it was before you re-installed p≡p.

      • If your mobile device was not part of a p≡p Device Group and you have a backup of your existing security keys, then you can restore your previous keys and everything will be back to how it was before you re-installed p≡p.

      • If your mobile device was not part of a p≡p Device Group and you do not have a backup of your existing security keys, then you will now be using the new key pair which will have one, maybe two implications:

      1. In all cases p≡p will automatically share your new Public Key with all the people you communicate with when you send them an emails. You will have to re-establish Secure Privacy Status by handshaking with individual contacts.

      2. If you had opted to store your emails encrypted with your provider, then you will not be able to read your previously encrypted emails.

    • What support do you offer for the p≡p mobile applications?

      All support is via e-mail via at support@prettyeasyprivacy.com

    • What is the easiest way for me to send you details about any issues I am having with my p≡p mobile application?

      If there is a serious issue with p≡p, then a pop-up window will give you the option to send us the crash log via an automatic email importantly there is no exchange of your private security key associated with this process. You can also send us screenshot of an issue via email to support@prettyeasyprivacy.com

    • How do I uninstall my p≡p mobile application?

      The p≡p app can be removed from your device like any other mobile app you have:

      • In the case of iOS you would:

      • Tap and hold any app icon until all the icons start wiggling.

      • Tap the X on the top left had corner of the p≡p app icon.

      • Tap Delete in the dialog that displays.

      • In the case of Android you would:

      • Go to your device's Settings app.

      • Select Apps or Application manager.

      • Touch the p≡p app.

      • Touch Uninstall.

    • After I have uninstalled my p≡p mobile application are the implications?

      If you had opted to store your emails encrypted with your provider, then you will only be able to read your previously encrypted emails on another devices with p≡p installed or any other PGP solution, and assuming that you restored your previous security keys.
    • Can p≡p for Android runs on Sailfish OS?

      Unfortunately Sailfish OS is not supported by p≡p for Android. However anyone is welcome to use source code of K-9 Mail / p≡p on https://cacert.pep-security.lu/gitlab/android/k9-pep and develop version for Sailfish OS.

    • How can I importing settings from K-9 Mail?

      Unfortunately it's not possible at the moment. You have to add all you credentials again. However you can install p=p for Android and use it at on the same device at the same time with existing K9 installation.

    • Why do I see red bar in p≡p for Android app?

      You will see red bar in the app, when email you're sending unencrypted email, you received unencrypted email or when the pEp engines does not work properly on android.

  • p≡p for Enterprises

    • Why should I encrypt my companies email when I am using Transport Level Security (TLS) already?

      TLS is designed to secure the transport of one hop of an email's journey, and you have no guarantee that all of the hops an email makes on its journey are going to be secured by TLS. Even if TLS protects every hop, the email still exists unencrypted on all the computers making up all the hops. So the only way to really protect your companies email is to use end-to-end encryption such as p≡p.
    • How should I think about p≡p for my company?

      p≡p offers a step change in the protection of your company’s internal and external digital text based communications. That said p≡p is designed to be compatible your existing protection solutions and is non-intrusive to the policies, procedures and practices which have built up around them.
    • Will p≡p help reduce Phishing, Spear Phishing and Whaling?

      If all internal email communication if Green/Secure, then you can rely on it and if an internal email has the Privacy Status of anything below Green/Secure, then your users will see it form a completely different point of view. In this sense p≡p dramatically reduces the risks associated with Phishing, Spear Phishing and Whaling.
    • Will p≡p work with my existing AES solution?

      Yes, since if p≡p finds that a message which is not in a standard format, which in the case of AES, it will just let is pass and not interfere and so you can drive the two systems in parallel.
    • Will p≡p work with my existing X509/RSA solution?

      Yes, since if p≡p finds that a message which is not in a standard format, which in the case of the proprietary RSA asymmetric encryption, it will just let is pass and not interfere and so you can drive the two systems in parallel.
    • Will p≡p work with my existing S/MIME solution?

      Yes, p≡p has full S/MIME support(from version 1.1) and it will work in with your existing S/MIME solution. Indeed if you have pre-configured your S/MIME solution it will just be in place and work the same with p≡p. So p≡p does the other thing (OpenPGP and OTR etc.) for the other cases, not the S/MIME pre-configured or on rules. If you do not have S/MIME, then p≡p is adding pre-configured S/MIME support without you having to do anything.

    • Will p≡p work with my existing PGP solution?

      Yes, as long as it's compatible with GnuPG implementation.

    • Will p≡p work with my existing Office 365 Message Encryption solution?

      Yes, p≡p will work with you existing Office 365 Message Encryption solution in one of two ways. Either Office 365 will encrypt the email and p≡p will not recognize the file type and so it will ignore it and let and leave it be transported as usual, or p≡p will encrypt the message itself and work over the top of Office 365 Message Encryption.
    • Will p≡p work with my existing SPAM solution?

      No, p≡p will not work with your existing SPAM solution. However, SPAM is dependent on unencrypted email and so SPAM mails come unencrypted not encrypted.
    • Will p≡p work with my existing Email Archiving solution?

      Yes, p≡p will work with you existing Email Archiving solution assuming and there are two main scenarios:

      1. If your company’s email archiving solution duplicates every email when it arrives on the local MTA (e.g. Exchange) you would still be able to read these emails later, even when they have been encrypted.

      2. If Exchange is not the MTA, and say there is a boarder MTA in front of Exchange e.g. A DM Set, then this server is untrusted and so the message needs to be encrypted with two keys (the users key and the second company key) and the original email is deleted from the untrusted mail server and the newly re-encrypted email is stored instead and in this case you have access to all emails with the company key. So yes, p≡p will work with your existing Email Archive solution and add the scenario where the message can be stored encrypted.

    • Will p≡p work with my existing Hold and Litigation Hold solution?

      Yes, p≡p will work with you existing Hold and Litigation Hold solution assuming that the emails are not stored encrypted.
    • Will p≡p work with my existing eDiscovery solution?

      Yes, p≡p will work with you existing eDiscovery solution assuming that the emails are not stored encrypted.
    • Will p≡p work with my existing Inactive Mailbox solution?

      Yes, p≡p will work with you existing Inactive Mailbox solution.
    • Will p≡p work with my existing Email Data Loss Protection (DLP) solution?

      There are three scenarios for how p≡p can work with you existing DLP solution:

      • You could take the business decision that an encrypted email is safe and so there is no need for DLP and it is OK for the DLP solution not to be able to read encrypted emails.
      • You could issue a company key for the DLP box to enable it to check encrypted mails. This would be beyond where most companies are today as this is not a feature of any S/MIME implementations.
      • We do have the option to implement DLP in p≡p by delivering an MTA that decrypts the message and send an unencrypted copy to the DLP and if the DLP let it through then in this case we would let the encrypted email through too. If this scenario is important to you then please contact us via the Enquire Form
    • Will p≡p work with my existing Auditing solution?

      Yes, p≡p will work with you existing Auditing solution assuming that the emails are not stored encrypted.
    • Will p≡p work with my existing Messaging Records Management (MRM) solution?

      Yes, p≡p will work with you existing MRM solution assuming that the emails are not stored encrypted.
    • Will p≡p work with my existing Information Rights Management (IRM) solution?

      Yes, p≡p will work with you existing IRM solution and indeed p≡p will not recognize the file type and so it will ignore it and let and leave it Rights Management properties in place.
    • Will p≡p work with my existing Journaling solution?

      Yes, p≡p will work with you existing Journaling solution assuming that the emails are not stored encrypted.
    • Does p≡p support Distribution Lists?

      p≡p fully supports Distribution Lists, be they centrally created by IT or created by your end-users.
    • What is the best way to purchase the p≡p products for my company?

      The best way to buy the p≡p products for companies of less than 500 users is:

      • p≡p for Outlook Subscription is available from here

      • p≡p for iOS in available on Apple's Volume Purchase Program

      • p≡p for Android is available from Google Play for Work

      If your company has 500 users or more then the best way to buy all of the p≡p products is via the p≡p Enterprise Subscription which is available from here

    • What is the p≡p Enterprise Subscription and how much does it cost?

      The p≡p Enterprise Subscription is user based and covers all of that user's devices (unlimited). It is designed for companies with 500 users and above and it comes with additional phone based support. Please click on Enquire if you would like to receive a quote for your p≡p Enterprise Subscription.

    • How are the p≡p products fulfilled with the p≡p Enterprise Subscription?

      With the p≡p Enterprise Subscription your company is issued with a unique Organization ID which can be used to freely download of all of the p≡p products for your user.

    • How do I get updates to the p≡p software?

      You have the option to self-host a p≡p update server within your firewall or allow your users to update their own p≡p software through our public update services.
    • How do I renew my p≡p Enterprise Subscription?

      You will be notified by p≡p 60 days prior to the end of the term of your p≡p Enterprise Subscription.
    • Will p≡p for Outlook still work if my p≡p Enterprise Subscription expires?

      When you p≡p Enterprise Subscription expires you will be able to read all of your previous emails and all incoming emails and messages, and see their Privacy Status. However, you will only be able to send emails and messages Gray/Unsecure, regardless of the Privacy Status, until you renew your p≡p Enterprise Subscription or buy individual p≡p for Outlook subscriptions.

    • What configuration options do the p≡p products have?

      The configuration options for the p≡p products are:

      • Store email encrypted by account (on/off)

      • Store email encrypted for all account (on/off)

      • Look up keys on key server (on/off)

      • Send first email without Key

      • Show Advanced Key Management (on/off)

      • Auto Update (on/off)

      • Subject encryption (on/off)

      • Send dump to our support@prettyeasyprivacy.com (on/off)

    • When might I want to store email securely?

      You would typically store the email securely on any server you do not trust, such as with a public email provider. In the case of your own email servers, of a business grade email service, you would typically trust the servers and opt to store the emails unsecurely on the server. In the case of p≡p for Outlook the default is to store the email unsecurely.

    • When might I want to look up keys on key server?

      It is very unlikely that you would ever need to look on a key server in a business scenario. Indeed the key servers are more related to the individual web users of OpenPGP. This is why in the case of p≡p for Outlook the default is to not look up keys on key server.
    • Why might I want to set send first email without a Key?

      You might want to send first email without a Key so that a recipient with no encryption available to them does not get confused by the security key attachment on the email that they would see. Clearly in responding to an email with a key attached, or if encryption is being forced, then a key would be attached. In the case of all p≡p products the default is to send all emails with the Key.
    • Why might I want to show Advanced Key Management?

      If your entire user base were (so called) power users then they will get value out of being able to carry out full manual management of their keys. Since this will not be the case, all of the p≡p products default not to show Advanced Key Management.

    • Why might I not want to have p≡p auto update?

      You may want to test any p≡p updates before they are applies to your users in which case you would turn the auto-update off. If you are self-hosting a p≡p update server behind your firewall then when you schedule the actual update is up to you regardless and so there is no need to turn the auto-update off even if you want to test the update yourself first. All of the p≡p products have the default of Auto Update on.
    • Why might I not want to encrypt the subject of an email?

      You may not want to encrypt the subject of an email if you have a large amount of S/MIME or PGP email encryption within your enterprise and you were concerned about the title of the email reverting to PEP and hence being unsearchable. Since so little email encryption of any kind takes place today all of the p≡p products default to encrypt the subject of an email.
    • Can I set these configuration options before I deploy p≡p for Outlook to my users?

      All of these configuration options are just registry keys and these are set as part of the deployment of p≡p for Outlook by either using a registry patch or an ADM template.
    • Can I set or reset these configuration options after I have deployed p≡p for Outlook to my users?

      You have two options to centrally set or reset these configuration options once you have already deployed p≡p for Outlook to your users. You can use Group Policies or you can send out a registry patch. Alternatively, the configuration can we set or reset locally using the registry editor.
    • Can I confirm that the p≡p for Outlook plug-in is running on the user’s PC?

      If Outlook is not running then you can see in the registry if p≡p will start when Outlook is started. If Outlook is running, then you can again check in the registry to see if p≡p is running as well.
    • How do I deploy p≡p for Outlook across my company?

      The easiest way to deploy p≡p for Outlook is to use the Microsoft Installer (MSI) based package file which comes with p≡p. This MSI file can be published and assigned (at either the user level or the computer level) through Group Policy as you do with any Windows based application today. This MSI file can also be used to remove p≡p for Outlook.
    • What if my users already have p≡p for Outlook on their computer?

      Generally, this is not a problem however we recommend that you still manage p≡p for Outlook centrally.
    • How do I deploy p≡p for iOS across my company?

      Apple's Volume Purchase Program allows you to distribute p≡p for iOS to managed devices or authorized users, either use your own “in-house” Mobile Device Management (MDM) solution or Apple Configurator. Either approach then lets you keep track of which users and device p≡p for iOS has been assigned to and if p≡p for iOS is no longer needed user or by a device p≡p for iOS can be revoked and reassigned to different user or different devices within your company. When a new iOS device is added to a user’s p≡p Device Group their p≡p for Outlook settings are synchronized to that device and these also become the settings for p≡p for iOS too. This ensures that however IT have configured p≡p for Outlook, this will be the default for all devices within the company.

    • How do I deploy p≡p for Android across my company?

      After you purchase p≡p for Android on Google Play for Work, it will be listed as an approved app and made available to users in your company. All of the configuration options in p≡p for Android can be configured via Google Play for Work to your Enterprise Mobility Management (EMM) console. When a new Android device is added to a user’s p≡p Device Group their p≡p for Outlook settings are synchronized to that device and these also become the settings for p≡p for Android too. This ensures that however IT have configured p≡p for Outlook, this will be the default for all devices within the company.

    • What if my user does not have a PC running p≡p for Outlook? Do I have the same granularity to set all of my desired configuration options directly to p≡p for iOS and p≡p for Android?

      Yes, assuming that your MDM solution does.
    • What if my users already have p≡p for iOS or p≡p for Android on their mobile device?

      Generally this is not a problem, however we recommend that you still manage p≡p for iOS or p≡p for Android centrally.
    • What deployment options do the p≡p products have?

      The Deployment options for the p≡p products are: 

      • Push Keys to certain User Groups

      • Push Trust to certain User Groups

      • Issues Company Key

      • Send dump to support@yourcompany.com

    • Why would I want to push Keys to certain user groups and how would I do it?

      You may want to push all of the keys to all members of a given user group to that all of the emails between the members of that user group are automatically send and receive Yellow/Secure email. The keys can be pushed by attaching them as a key file to an email which is sent to the group and their p≡p will automatically import the keys

    • Why would I want to push Trust to certain user groups and how would I do it?

      You may want to push Trust to all members of a given user group to avoid the need for them to carry out a “handshake” in order to verify each member of the group and send Green/Secure emails. The Trust can be pushed either during deployment or after deployment and it is done by writing to the system database using SQL scripts which are handled by p≡p automatically.
    • Why would I want to issue a Company Key and how would I do it?

      You may want to issue additional company keys so that the company can decrypt and re-encrypt certain email messages at certain places for different reasons, for example to support and existing DLP solution. There is also a possibility that the private keys for these additional company keys can be stored (and not connected to any device) and are then used when there is no other way to read that mail, so more or less like a backup line or a second line of defence if you lose everything then you never lose your data. In fact you need a key for any entity that has to check the content of encrypted emails or re-encrypt – but they all have to be used every time you are sending out a message. These company key is issues to all of the users who it needs to apply to as an additional key. You also have the option where your Chief Security Officer (CSO) can have the private key of all of the users and in this way they can have access to anybody’s emails if things ever go wrong then they can help enabling people to read their mail so nothing gets lost. p≡p supports storing your private key on any PGP compatible device so you can store them on a token and that can be put in a safe
    • Can p≡p do Key Escrow?

      No p≡p does not support Key Escrow in its first release but it will work with any existing Key Escrow server. If you are interested in this feature then please contact us via Enquire Form

    • Does p≡p come with a key management tool?

      p≡p is compatible with Open PGP and so you can use any software solution which is available on the market for such key management. p≡p itself comes with the open source tool, the GNU Privacy Assistant which is a fully functional GUI for the GNU Privacy Guard and this can be found in the advanced settings in the backstage area f p≡p for Outlook. p≡p for Android includes key management build-in.

  • p≡p for Software Solutions

    • How is the p≡p software architected?

      There is a p≡p Engine at the core (same for all platforms) and there are Adapters in the layer above the engine used to build p≡p Plugins and p≡p Apps. For example, there is a native UI for iOS (the app) that accesses the engine via the iOS adapter. Please click here to learn more about p≡p Architecture overview

    • What is the p≡p Engine?

      The p≡p Engine is open source software that is available via the GPL 3.0 license and today runs on OSX, Linux, Windows, Android and iOS. The p≡p Engine includes Encryption Services (S/MIME and PGP), Automated Key Management Services and Anonymization. These are implemented via GnuPG, NetPGP, OTR, GNUnet, MIME and XMPP.

    • What Adapters are there?

      Adapters exist for COM Server, Java, JSON, Qt. Python and Objective C.

    • How can I find out more about the potential of using p≡p as part of my Software Solution?

      We would welcome your enquiry

  • The p≡p Company

    • Who is pretty Easy privacy?

      pretty Easy privacy (abbreviated as p≡p) is a leading provider of cybersecurity solutions which protect the confidentiality and reliability of communications for citizens, for public offices and for enterprises.

    • What is the motivation of p≡p?

      Ultimately, p≡p wants to change the default of online text-based communications from unencrypted, unverified and unanonymized to encrypted, verified and anonymized.

    • What is the basic idea behind p≡p?

      If text-based communications is assumed to be encrypted, verifiable and anonymized by default, then we can build software to do this which is pretty easy, in fact very easy to use. p≡p, contrary to existing cryptographic solutions, is easy to install, use and understand, allowing all users, not just power users, to use end-to-end cryptography.

    • How long have you been working on p≡p?

      The idea for p≡p came to us in the summer of 2012.

    • What have the major milestones been for p≡p since then?

      The major milestones for p≡p since inception have been:

      Winter 2012

      First p≡p algorithms were developed

      Winter 2013

      First version of the p≡p Engine was running

      Spring 2014

      p≡p for Outlook was piloted in some large Enterprises

      Summer 2014

      p≡p Company was formed

      Fall 2014

      p≡p for Outlook Preview was made available

      Fall 2014

      Crowdfunding raised $50,000 

      Winter 2014

      Development started on p≡p for iOS and p≡p for Android 

      Summer 2015

      First round of funding raised €3,000,000

      Fall of 2015

      Development Team and Support Team were both expanded

      Fall 2015

      Enigmail partnership

      Winter 2015

      p≡p Foundation established

      Winter 2015

      Financial support from the Luxemburg Government granted

      Summer 2016

      p≡p for Outlook and p≡p for Android launched

      Spring 2018

      Enigmail with p≡p launched

      Summer 2018

      p≡p for iOS will launch

      2019

      p≡p for browsers and p≡p for Apple Mail will launch

       

    • Who is behind p≡p?

      The four co-founders of p≡p are:

    • Why is the company offering Commercial Software and Free Software products

      p≡p is active in both the Commercial Software and the Free Software markets to ensure that p≡p can reach its full potential.
    • Why did you also start the p≡p Foundation?

      The p≡p foundation has a separate charter to advocate for Privacy and Freedom of Information. It is also responsible for distributing the core p≡p technology under the GNU GPL Version 3 License.

    • Why is p≡p headquartered in Luxemburg and Switzerland?

      Luxemburg and Switzerland are neutral countries which provide high levels of support for privacy.
    • Is https://pep.security really your other website?

      Yes, this is our new upcoming website. For the moment we are using both websites www.prettyeasyprivacy.com and pep.security.