This page is plain about the parts of email that aren't private and what we've built around them. We don't oversell the encryption story.
Email is fundamentally a 1980s protocol grafted onto the modern internet. Some parts of a message can be encrypted in ways that even we can't read; other parts (subjects, recipients, timing) can't, because the email system itself needs them in cleartext to route. We're honest about which parts are which.
jordan.lee@mailcedar.com exists.Mailcedar runs on bare-metal servers we own and rack ourselves, hosted by iWeb in Montréal, Québec. We chose Canadian data centres specifically because Canadian privacy law (PIPEDA) is reasonably consumer-protective and the data stays under one jurisdiction.
We don't use Amazon, Google, or Microsoft for the mail path. That means we're slower than them at adopting fancy ML features and faster at fixing things ourselves when they break.
| SPF, DKIM, DMARC | Required for inbound; configured for all outbound. DMARC reports published quarterly. |
|---|---|
| MTA-STS & TLS-RPT | Both published; our policies are enforce. |
| DANE TLSA | Published for inbound MX. |
| TLS | 1.3 preferred, 1.2 minimum. ECDSA P-256 + RSA-2048 dual-stack. |
| WebAuthn / FIDO2 | Supported for sign-in and step-up. |
| OpenPGP | Web Key Directory publishing. PGP key discovery for outbound. |
| JMAP | Read-only public API. Modern alternative to IMAP for developers. |
We engage Cure53 for an annual web app and protocol audit. The most recent report (October 2025) is available to enterprise customers under NDA. Summary findings are published as a blog post six weeks after each audit cycle.
We don't claim SOC 2 because we don't believe a certificate from a paid auditor tells you what you actually want to know about a small mail company. We'd rather you read the audit reports.
We comply with valid Canadian legal process. We push back on overbroad orders, gag orders that prevent notifying you, and any request from a foreign jurisdiction that doesn't come through MLAT.
Our position:
As of the most recent quarterly statement (signed and timestamped on April 1, 2026), Mailcedar has not:
The next signed canary is published on July 1, 2026. The PGP-signed statement and our public key live at /canary.txt on this domain.
Email security@mailcedar.com with details. PGP key at /security-pgp.asc. We respond within two business days. Bounty range $200–$15,000 depending on severity; we publish our scope and out-of-scope list at /.well-known/security.txt.
If you close your account, we permanently delete all your mail within 30 days. Backups age out within 60 more days. After 90 days from closure there is nothing left of your account on our systems — not the username, not the metadata, not the encrypted blobs. We tested this. We can prove it.