← Back to ecosmail.fr Version francaise

Security Roadmap

Last updated: April 18, 2026 · Short term + Mid-term E2E + Long-term certifications

Our commitment — radical transparency.
Security is a journey, not a marketing slogan. This page honestly documents the current state, what is not yet in place, and our roadmap across 3 horizons: short term (technical hardening), mid term (E2E client-side), long term (compliance and certifications). Updated with every major release. See also: public scores & audit sources.

1. Current state (April 2026)

What already protects your data today:

2. What is NOT yet in place

Total honesty. We do not currently describe EcosMail as « end-to-end encrypted » because that would be inaccurate. Here is what that concretely means.

What service operators can technically do

This access is currently necessary to operate webmail display, opt-in AI classification, full-text search, technical support, and backups. It is strictly governed by internal access rules and GDPR.

Opt-in AI (if you enable it)

The AI Briefing, AI Replies, and AI Analysis features send your email content to Anthropic (USA) for processing. This is an explicit opt-in, disabled by default, and revocable at any time in Settings. Without opt-in, no content leaves our EU infrastructure.

3. Short term — Hardening in progress (3-6 months)

Continuous technical improvements. Real-time verifiable status on our transparency & audits page.

DONE Postfix cipher hardening
2026-04-18

DES/RC4/3DES/SHA1 excluded, AEAD-only (TLS 1.2+). Verifiable via internet.nl Mail.

DONE Hardened HTTP headers (HSTS preload-ready, CSP+, COOP/CORP)
2026-04-18

HSTS max-age 2y + preload, CSP with base-uri/form-action/object-src/upgrade-insecure-requests, COOP/CORP same-origin, extended Permissions-Policy, server_tokens off, removed reverse proxy duplicates. Mozilla Observatory: 55 → 80.

DONE MTA-STS enforce mode + TLS-RPT
2026-03-29

MTA-STS policy published in enforce mode on mta-sts.ecosmail.fr. TLS-RPT reporting active.

DONE DMARC p=reject + Fail2ban (postfix-sasl, dovecot-auth)
2026-03

DMARC in strict mode (rejection of spoofed emails). Fail2ban active on SMTP/IMAP services.

DONE security.txt RFC 9116
2026-04-18

Published at /.well-known/security.txt. Allows security researchers to instantly find the right contact (security@ecosmail.fr) and disclosure policy. Expires 2027-04-18 (to renew).

DONE DNSSEC for ecosmail.fr
2026-04-19

DNSSEC activated via IONOS panel. DS 39605/RSASHA256 published at AFNIC, full chain root → .fr → ecosmail.fr. Strict validation confirmed (Verisign DNSSEC Analyzer + delv: fully validated).

IN PROGRESS DANE TLSA
blocked — DNS migration under review

The IONOS DNS panel does not support TLSA record type, preventing publication of the public-key hash required by DANE. Hash already generated and certbot --reuse-key active for stability. Migration of DNS management to a compatible operator (deSEC.io or equivalent European, non-profit) under review. Expected after migration: internet.nl Mail → 95%.

PLANNED CSP refactor: extract inline scripts
Q2 2026

Migrate inline <script> blocks to external files to remove 'unsafe-inline'. Mozilla Observatory: 80 → 100.

PLANNED BIMI + VMC (Verified Mark Certificate)
Q3 2026

Authenticated logo in Gmail, Apple Mail and Yahoo Mail. ~€1k/year for VMC at DigiCert/Entrust.

TO CONFIRM HSTS preload list submission (Chromium)
Q2 2026 (decision)

Submit ecosmail.fr to hstspreload.org. Forces HTTPS on all subdomains at browser level. Irreversible decision — to confirm only when sure all subdomains will be HTTPS forever.

BLOCKED IPv6 on mail server
awaiting IONOS

IPv6 currently unavailable on our IONOS VPS. Once allocated: Postfix inet_protocols=all + AAAA mail.ecosmail.fr. Expected: internet.nl Mail +20pts.

4. Mid term — E2E client-side roadmap (12-18 months)

Our goal: ensure the server never sees plaintext content. This is a multi-phase effort.

DONE Phase 1a — Backend crypto primitives
Shipped: April 2026

X25519/Ed25519 generation at signup, secure storage, push payload v2, infrastructure for encrypted server-to-mobile exchanges.

IN PROGRESS Phase 1b — Mobile client decryption
Target: Q1 2027

The EcosMail mobile app decrypts E2E payloads client-side. This is the main technical lock. Once shipped, push notifications become genuinely E2E between server operations and device.

PLANNED Phase 2 — E2E by default for intra-EcosMail DMs
Target: Q2 2027

All direct messages between EcosMail users are encrypted with the recipient's X25519 key. The server stores ciphertext only.

PLANNED Phase 3 — SMTP E2E via OpenPGP / Autocrypt (optional)
Target: Q3-Q4 2027

For exchanges with external contacts (Gmail, etc.), optional OpenPGP support via the Autocrypt standard. Compatible with Thunderbird, Proton, Mailvelope.

5. Long term — Compliance & certifications (12-36 months)

Three-tier trajectory, calibrated for a pragmatic European startup. Verifiable and auditable at each step.

Stage A — Legal foundations (0-3 months — budget ≈ €0)

Be able to say « we are serious » without lying. Everything is free, just time.

IN PROGRESS Foundations bundle
Target: Q2 2026

Stage B — Audit-friendly proof (3-6 months — budget €7-15k)

Provide audit-friendly proof verifiable by any B2B prospect.

PLANNED Annual pentest by French firm
Q3 2026 — budget €5-10k

Targeted app + infra audit by a recognized French firm (Almond, Synacktiv, Lexfo). Publishable remediation attestation (full report stays confidential).

PLANNED CSA STAR Level 1 (CAIQ self-attestation)
Q3 2026 — budget €0

Cloud Security Alliance STAR Registry, Level 1 (free self-attestation via CAIQ ~300 questions, ~3-5 days drafting). Usable badge + entry in public CSA registry.

PLANNED Cyber insurance
Q3 2026 — budget €1-3k/year

European insurer (Stoik, Hiscox, Coalition). Cyber incident + breach notification coverage. Required by 80% of B2B prospects.

CONDITIONAL Google CASA Tier 2 (if public Gmail OAuth)
Q4 2026 — budget €5-10k

CASA audit via Securitum (Poland) or DEKRA (Germany) required to move gmail.readonly scope out of « Testing » mode (>100 users). To evaluate after traction.

PLANNED Microsoft Graph Publisher Verification (Outlook OAuth)
Q4 2026 — budget €0-2k

Microsoft is much more permissive than Google. Free verification via Microsoft Partner Network.

Stage C — Heavy certifications (12-36 months — budget €10-50k)

Triggered when revenue / B2B clients justify it. Strategic choice between privacy-first (Europrivacy) or enterprise-ready (ISO 27001).

PLANNED Independent E2E audit
Q4 2027 — budget €15-25k

Comprehensive audit of E2E architecture by recognized firm (Quarkslab for crypto, Synacktiv generalist, Cure53 for crypto/web). Public report. Trigger: Phase 2 delivery.

DECISION Europrivacy OR ISO 27001:2022
2027+ — revenue / B2B trigger

Europrivacy (€10-20k, 4-8 months): only certification formally recognized as GDPR-compliant (Article 42). Audience: French DPOs, public sector, HR/health. EU bodies: Bureau Veritas, AFNOR Cert, ECCP.

ISO 27001:2022 (€25-40k, 6-12 months): global enterprise standard, asked by large IT departments. EU bodies: Bureau Veritas, LRQA, DEKRA, AFNOR. Extension ISO 27701 (+€10-15k) adds privacy scope.

OPTIONAL « France Cybersecurity » ANSSI label
2027+ — budget ~€10k

Free ANSSI dossier + qualified provider audit to assemble it. French marketing differentiator. ANSSI decision ~6 months.

6. How to verify our claims

7. Glossary

TermMeaning
Encryption at restData stored on disk is encrypted. Accessible to the running server.
Encryption in transitData protected during network transport (TLS).
E2E (end-to-end)Client-side encryption: only sender and recipient have access to plaintext. The server only sees ciphertext.
X25519Asymmetric key exchange algorithm (Diffie-Hellman on elliptic curve).
Ed25519Digital signature algorithm. Used to prove identity.
AES-256-GCMSymmetric AES 256-bit encryption with GCM (authenticated) mode. Military-grade standard.
AutocryptOpenPGP key exchange standard via email. Enables E2E with Gmail, Proton, etc.

8. See also

Transparency & external audits — all our security scores measured by public open-source tools (internet.nl, SSL Labs, Hardenize, etc.) with direct verification links.

9. Contact

Questions, reports, suggestions: security@ecosmail.fr

This page is intentionally detailed. If anything seems inaccurate or misleading, tell us — we will fix it.