All approaches to registered email are far from being straightforward solutions, are very limited on what can and cannot be done, or either both. Why should eEvidence be different?
The eEvidence method was not designed as an alternative to regular email communications, but as a simple way to secure your ordinary emails. It is for you to judge whether we have succeeded.
This is how it works
There are several articles within these FAQs in which we provide further details about each specific topic. For the basics, this is how we do it:
On average, the whole process doesn't take more than a few seconds.
So what?
Each individual hash represents a piece of the email's content puzzle. On the basis that two different documents cannot generate the same hash, the hash of a given file equates to the file itself.
For the emails you send, by delivering the email to the recipient's mail server, we prove it was accepted at destination. We decline to demonstrate it was opened and read by the recipient; it really isn't that relevant and there's actually no reasonable way to prove such a thing.
For the emails sent to you, we prove beyond doubt that the email came from the sender's legitimate mail server.
The digital signature grants that the eEvid.Cert content has not changed since the signature was applied. By including a time stamp in the Daily Report of evidences, we define the time at which that content already existed. If a hash existed on a given date, the file it was obtained -your email- must also have existed on that date.
Ultimately, we prove WHAT the email contained, WHO the sender and the recipient were and WHEN it was sent and delivered.