SECURITY

How we protect what is yours, and what we expect of you.

Security at PAYTONMAIL is an operational posture, not a marketing claim. The mechanics are documented here.

Encryption is the floor. The architecture around it is the ceiling.

In transit

All connections to PAYTONMAIL are served over TLS 1.3 with modern cipher suites and strict transport security. Mail to and from other providers is delivered over opportunistic TLS where supported, and we publish MTA-STS and DANE records to enforce it where possible.

At rest

Member mail is stored on encrypted volumes on dedicated hardware. Access by PAYTONMAIL operators is gated by short-lived credentials, requires a second operator's approval, and is logged in a tamper-evident audit trail.

Account recovery

We do not offer self-service password resets. Recovery is performed by a member of the concierge team after verifying your identity against credentials you arrange in advance. This is slower than the industry default. It is also why our accounts do not get socially engineered.

Metadata

We retain only the metadata required to deliver mail and operate the service. Delivery logs are purged after 30 days. We do not retain IP addresses on a per-message basis. We do not maintain a social graph.

The envelope matters as much as the letter.

Government requests

We publish, in writing, every government request for member information and our response to it. We will challenge any request that we believe to be overbroad or improperly served, and will notify affected members where the law permits.

Responsible disclosure

If you believe you have found a vulnerability, write to security@paytonmail.com. We acknowledge reports within two business days and pay bounties for valid findings.