Private Mail Access.txt ›
: Users can select individual subfolders (e.g., "Invoices" or "Support") rather than granting access to the entire inbox.
: Utilizing asymmetric encryption, the system generates a session key for the guest user, allowing them to decrypt only the authorized messages while keeping the rest of the mailbox mathematically inaccessible to them. private mail access.txt
The text file suggests a feature centered on secure, granular control over email communications . : Users can select individual subfolders (e
: Every open, reply, or download performed by the delegated user is logged with a unique signature, providing a clear audit trail for the primary owner. : Every open, reply, or download performed by
A standout feature for this concept is Feature: Zero-Knowledge Mailbox Delegation
: Access is governed by a "Private Mail Access" token that automatically expires after a set duration, ensuring no long-term security debt.
This feature allows a primary account holder to grant temporary, restricted access to specific folders or threads to another user without ever sharing their master password or exposing private encryption keys.