Blog
Security, Privacy & Zero-Knowledge
Practical articles on encryption, secure sharing, message expiry, and privacy-by-design patterns you can actually use in real work.
2026-03-04
What is Zero-Knowledge Encryption?
A plain-English explanation of how your data stays private — and why even we can't read your messages.
Read article2026-05-22
Future DeliveryEncrypted Dead Man's Switch: What It Is and When It Makes Sense
A dead man's switch is not only for spy fiction or catastrophic scenarios. In encrypted form, it becomes a practical tool for continuity, succession, and last-resort disclosure.
Read more2026-05-14
Future DeliveryHow to Send a Message After Death Without Trusting an Inbox
If a final message matters, it should not depend on someone remembering a password or a mail provider keeping a draft safe for years. Encryption changes the model.
Read more2026-05-10
Zero-KnowledgeGDPR, Zero-Knowledge Encryption, and the Breach Notification Problem
GDPR requires breach notification within 72 hours. Zero-knowledge encryption changes the calculus — because a breach of ciphertext may not be a breach of personal data.
Read more2026-05-02
Future DeliveryWhat Is Time Vault and When to Use It
Time Vault is a message that cannot be opened before a date you choose. The use cases range from board-level strategy to letters for your children.
Read more2026-04-24
Secure SharingSecure File Drop: A Private Alternative to WeTransfer
WeTransfer and similar services can read every file you upload. Here's who that affects, why it matters, and how zero-knowledge file sharing works differently.
Read more2026-04-16
Secure SharingWhat Is Message TTL and How to Set It Wisely
TTL — Time To Live — is the expiry window on a secure message. Setting it wrong in either direction has real security consequences.
Read more2026-04-07
Security ArchitectureAES-256 vs AES-128: Does Key Length Actually Matter?
Both are considered unbreakable by today's standards. So why does mboxly.app specifically choose AES-256 — and when does the difference start to matter?
Read more2026-03-28
Secure Sharing5 Situations When Email Is the Wrong Tool for Sensitive Data
Email was designed in 1971 to move text between terminals. It was never built for confidentiality — and these five scenarios make that painfully clear.
Read more2026-03-20
Secure SharingBurn After Reading: How Self-Destruct Messages Actually Work
A message that deletes itself after being read sounds like a spy film trope. Here's the technical reality — and why it's more reliable than you might think.
Read more2026-03-12
Zero-KnowledgeThe # in the URL That Keeps Your Key Secret
The tiny hash symbol in a secure link is not a coincidence — it's the technical reason why even we can't intercept your decryption key.
Read more