Public Roadmap

Built in the open.

We believe you should know what we're working on. This is our public roadmap — updated as we ship. Have a suggestion? Let us know.

✓ Shipped ⟳ In Progress ◷ Planned ⊙ Research
14 Features shipped
5 In progress right now
9 Planned & coming
4 In active research
Foundation

Q1 2025 — Launch

✓ Shipped

End-to-end encrypted webmail

Full PGP/AES-256 encryption in the browser. Zero-knowledge architecture from day one.

✓ Shipped

@enemail.de addresses

Clean, private email addresses. No personal information required to sign up.

✓ Shipped

EU-only infrastructure

All servers on dedicated Evolushost hardware in Frankfurt, Berlin, and Vienna.

✓ Shipped

Spam & phishing protection

Server-side filters to block spam and phishing without scanning message content.

✓ Shipped

Waitlist & closed beta

Gradual rollout to ensure infrastructure stability before general availability.

Now

Q2 2025 — Core features

⟳ In Progress

Mobile apps (iOS & Android)

Native apps with biometric login and full E2E encryption. Same zero-knowledge guarantees as the web app.

⟳ In Progress

Custom domain support

Use your own domain (e.g. you@yourcompany.com) with full enemail encryption.

⟳ In Progress

IMAP/SMTP bridge

Use enemail with any email client — Thunderbird, Apple Mail, Outlook — while keeping E2E encryption.

⟳ In Progress

Two-factor authentication (FIDO2)

Hardware security key support (YubiKey, passkeys) in addition to existing TOTP authentication.

⟳ In Progress

Advanced spam & phishing filters

Improved heuristics that block phishing attacks without scanning email content — privacy-first filtering.

◷ Planned

Disposable addresses

Generate unlimited throwaway addresses that forward to your main inbox. Perfect for signups and newsletters.

◷ Planned

Encrypted contact book

Store contacts end-to-end encrypted. Public keys are cached automatically for frequent recipients.

◷ Planned

Email read receipts (opt-in)

Optional delivery and read confirmation — fully opt-in on both sender and recipient side, no tracking pixels.

Coming up

Q3 2025 — Power features

◷ Planned

Encrypted calendar

A zero-knowledge calendar integrated with your inbox. Events, invites, and reminders — all encrypted.

◷ Planned

Encrypted file storage

Send and store attachments with the same zero-knowledge guarantees as your email.

◷ Planned

Team accounts & shared inboxes

Manage multiple users under one organisation. Shared inboxes with per-user access control.

◷ Planned

Auto-expiring messages

Set messages to automatically delete after a time period — on both sender and recipient side.

◷ Planned

Email templates & signatures

Save reusable templates and rich-text signatures, stored end-to-end encrypted in your account.

◷ Planned

Keyboard shortcuts

Full keyboard navigation for power users. Archive, reply, compose, switch folders — all without touching the mouse.

Coming up

Q4 2025 — Advanced features

◷ Planned

Encrypted calendar

A zero-knowledge calendar integrated with your inbox. Events, invites, and reminders — all encrypted.

◷ Planned

Encrypted file storage

Send and store attachments with the same zero-knowledge guarantees as your email. Up to 10 GB on Pro plan.

◷ Planned

Team accounts & shared inboxes

Manage multiple users under one organisation. Shared inboxes with per-user access control and audit logs.

◷ Planned

API access

Developer API for building integrations on top of enemail — webhooks, message retrieval, sending — all encrypted.

Horizon

2026 & beyond

⊙ Research

Post-quantum cryptography

Evaluating NIST-standardised algorithms (CRYSTALS-Kyber, CRYSTALS-Dilithium) to future-proof against quantum computers. Planned integration once standards stabilise.

⊙ Research

Anonymous routing

Optional routing through onion/Tor-like infrastructure to hide metadata — who communicates with whom — in addition to content.

⊙ Research

Independent security audit

Full cryptographic audit by an external security firm. All results — including vulnerabilities found and fixes applied — will be published in full.

⊙ Research

Open source client

Publishing client-side encryption code for independent verification. Planned initially for the browser extension, then the full web client.

⊙ Research

Decentralised identity

Investigating W3C DID / Verifiable Credentials to let users prove ownership of their email address without a central authority.