During other email installations, a pop-up may appear requesting access to the address book. This may be useful in some cases, as it allows the app to import all contacts straight away and the user to launch an email easily. However, it involves uploading the email addresses of all the contacts to the servers of the app developer. In other words, the email addresses and contact information are copied to another location. The question is to what extent this constitutes a risk for your organization. It may be the case that the address book lists persons in a sensitive position or with a secret address. The third party will also have come into the possession of the personal data of colleagues or clients, who won't be aware that the third party possesses their data. Consider the legal ramifications for your organization, e.g. with regard to its privacy policy and any contracts or non-disclosure agreements signed with business partners. Such agreements may contain clauses preventing the sharing of client data with third parties.

Emails sent by other messaging apps are usually accompanied by behavioral and user data, which is transmitted in the background. By analyzing this data, other parties may be able to infer who was in contact with whom, at what time and how often. This data may also include user status and profile pictures.

On other apps if network traffic is not sufficiently encrypted, external parties will be able to intercept it and view the contents of messages. Both foreign intelligence agencies and criminal organizations are keen to intercept network traffic, and have the means to do so.

You organization neither manages the server nor has an overview ofthe data that have been transmitted to it. In addition, such data may be stored on servers in foreign countries, in which case different laws and regulations apply. This potentially allows third parties to access and share the data without permission. Foreign intelligence agencies may request such data if they are stored on servers which fall under their jurisdiction. By consequence, your organization is reliant on the security of a third party with which you have not entered into an agreement.


Choctaw - an email system that provides you with complete security.

New feature added two-factor authentication (2FA KEY) requires both a KEY FILE and a password. You can put that key file on a separate encryptedUSB drive or flash storage. Enter the password and select the key file using the file selection window.

Choctaw sends and receives email with the highest levels of security and provides a nearly seamless method of encoding and decoding messages. Choctaw can use either asymmetric cryptography (public key) or symmetric cryptography (private key) cyphering. Choctaw works with TLS and SSL security automatically with your email service providers.

The real power of Choctaw is in your hands. Choctaw comes with the PDA public key utility and the CYPHER light key utility. Your email messages can be cyphered with password, key file or public key security. You control the keys. Send Public keys or use the ONE TIME PAD feature with private keys made with our revolutionary CYPHER light key TRUE random number generator.

Choctaw provides the ability to manage your email from multiple services all in one application. Choctaw also cyphers all of your data stored on your local computer including inbox saved messages, outbox saved messages, email address book and email service provider information. The total security is provided so that any attempt to breach your email stored on your computer is thwarted.

Choctaw now includes a MASS EMAIL feature allowing you to select and send emails to everyone in a selected address book. This feature is useful for newsletter, customer notification or employee emailers. In addition, each email sent can be encrypted with individual cypher keys, public, private or password.


CHOCTAW is fully compatible across systems - Windows, Linux and Android

Choctaw is a POP3 and SMTP email application with TLS and SSL automatic security.

Choctaw has two cyphering systems:

A symmetrical stream cipher private key system that can be used in a ONE TIME PAD mode. This means that you must exchange keys with the individuals you wish to communicate to and use the key only ONE TIME.

A asymmetrical public key system using a 4096 bit RSA key and a built in unique session key for each email message. Choctaw allows you to add the public keys directly to your outgoing emails and decodes any incoming emails using your personal key ring. New version contains public key maker included directly in email program. Make 4096 bit RSA keys right at the compose email menu.

Pentium 4 or later/Athlon or later
Windows Vista, Windows 7 or later


Android is a registered trademark of Google Inc.
Windows is a registered trademark of Microsoft Inc.

Choctaw Manual (PDF Format)