How does it work? (... the science bit)

Let’s take a look at Alice; she wants to send Bob a secure email and has come to Jumble for help.

When Alice registers with Jumble we create a special set of encryption keys and hold them for her. This allows her to login from any device or location while ensuring that her encryption keys are always available; this means she can access her emails on the go, from mobile devices, anywhere!

We use a special type of cryptography called Public Key cryptography; this means that the key we generated for Alice, let’s call is KEY-A, is actually composed of two parts; one we keep private just for Alice (this is used to decrypt messages sent to her), and a public one that we give to anyone who wants to send Alice an encrypted email.

Alice’s Jumble password is the master key for her encrypted emails. When she sends an encrypted email with Jumble we generate a random encryption key, let's call this one KEY-B. We then use Alice’s public KEY-A to encrypt KEY-B and include the encrypted version of KEY-B in the email and send it to the recipients.

This means that when Bob receives an email from Alice he can use his private KEY-A to access the message. And because Jumble always has the keys ready and waiting for Bob, he can access his emails anywhere, anytime, on desktop, mobile, tablet and email clients.

Learn more