Many wonder if the technology they are using is secure and safe. Read on for gpost's security information.
Yes, it securely operates as a closed system. No other email server can spam any GPost account. Within the system, GPost provides the capability for users to block other users or report any offensive content so that corresponding accounts may be terminated.
Now for some technical jargon.
The gpost solution has robust firewall protection on the server-side. All requests to gpost web servers are protected by HTTPS or Hypertext Transfer Protocol Secure. (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network and is widely used on the Internet. All data related requests from both web apps and mobile apps are protected with CSRF token. gpost also employs SaltStack infrastructure automation software, which is used by IT, network, and security operations teams to drive security and reliability for digital business. All the small components that are used in the gpost solution are up to date and at the latest version.
All gpost message communications are securely protected by TLS (Transport Layer Security) certificate. gpost uses a secure SSL/TLS certificate with Strong SHA-2 and 2048-bit encryption. User A logged into gpost web or mobile app by TLS. Mail sent from user A to user B is sent by SMTP TLS, then user B also employs TLS to receive the mail by IMAP TLS.
Quote: "SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA)".
Quote: "It is therefore estimated, that standard desktop computing power would take 4,294,967,296 x 1.5 million years to break a 2048-bit SSL certificate."