Короче lavabit, что обещали выполнили. Вот сейчас читаю спецификацию. Выглядит как минимум перспективно и очень похоже на обычную почту. Сорцы тут, пока поддержки со стороны почтовых серверов, я так понимаю нет, каталог magma server daemon на github'е пуст.
The D/MIME message format relies on 3 cryptographic algorithms for key agreement, encryption and signatures. The Elliptical Curve Diffie-Hellman (ECDH) [ECDH] key agreement protocol is used to calculate a shared secret. Encrypted payloads and keyslots are encrypted using the Advanced Encryption Standard (AES) [AES]. Both encrypted and cleartext data is verified using the Edwards-curve Digital Signature Algorithm (EdDSA) [EDDSA]. The AES key used to protect individual key slots, or the Key Encryption Key (KEK), and is calculated using ECDH and the secp256k1 elliptical curve. Each KEK is generated using an ephemeral message key, and the public encryption key stored in the signet of each actor associated with a message (author, origin, destination and recipient). Keyslots are protected using a 256-bit KEK, and encrypted using AES and the cipher-block chaining (CBC) mode of operation. Keyslots hold randomly generated 256-bit AES keys along with the randomly generated Initialization Vector (IV) needed to access encrypted payloads. The encrypted message data and the cleartext data for every encrypted chunk payload are signed using the EdDSA algorithm. Signatures are generated using the Twisted Edwards curve: x 2 + y 2 = 1 (121665/121666)x 2 y 2 (collectively called Ed25519) which is birationally equivalent to Curve25519.