Loading... 0%
Rocheston Wasabi
Don’t email sensitive data. Secure it. Read once. Deleted forever.

The Problem

Email was designed for a different era. Today, it’s a high-risk channel for sensitive information because it creates permanent copies across multiple systems: sender mailbox, recipient mailbox, mail servers, backups, compliance archives, and more.

Even when you “delete” an email, it may still exist in provider backups, corporate journaling systems, or eDiscovery archives. Email also leaks metadata by default: who contacted whom, when, and from where. In short, email is great for convenience, but terrible for confidentiality.

“Email isn’t a message. It’s a trail of copies.”
The Problem

Why Email Is Broken

Modern email is broken for privacy because it was not designed as end-to-end encrypted by default. Providers can scan content, index it, and route it through detection engines. Organizations often deploy mail gateways that inspect every message for policy enforcement.

This is not “evil”—it’s how modern email security works—but it means confidentiality is not guaranteed. On top of that, forwarding and screenshots turn sensitive mail into permanent exposure. Even “encrypted email” solutions often rely on server-side keys or portals that the provider can still access.

“The biggest email vulnerability is that it worked exactly as designed.”
Why Email Is Broken

What Wasabi Does Differently

Wasabi does not try to “fix email.” Instead, it removes email from the trust boundary. Email becomes a notification channel only, not the content channel. The message content is encrypted client-side and stored as an unreadable blob.

The email you send contains a link to retrieve the encrypted blob, not the message itself. The access code is never sent to the server. Without the code, the blob is useless ciphertext. This design sharply reduces the harm of mailbox compromise and provider scanning.

“Email is the envelope. Wasabi is the sealed safe inside it.”
What Wasabi Does Differently

End-to-End Encryption

Wasabi uses true client-side end-to-end encryption. The message is encrypted in the sender’s browser before upload. The recipient decrypts in their browser after download.

There is no server-side decryption, no server-side key escrow, and no “portal that can be compelled to decrypt.” If the server database is leaked, attackers get only ciphertext, salt, and nonce—still not enough to decrypt without the unique access code.

“Encrypted on your device. Decrypted on their device. Nowhere else.”
End-to-End Encryption

The Cryptography Stack

Wasabi is built with modern, widely reviewed cryptographic primitives used in high-security systems:

“No custom crypto. Just the best modern primitives, combined correctly.”
The Cryptography Stack

Zero Knowledge by Design

Wasabi is designed so the server never learns your secret. The access code never leaves your device. The derived key never leaves your device. The plaintext never leaves your device.

Wasabi servers store an opaque ciphertext blob and deliver it to the recipient when requested. This keeps the platform aligned with a simple principle: if we don’t have it, we can’t leak it.

“The safest data is the data you never had.”
Zero Knowledge by Design

One-Time Read and Self-Destruct

Wasabi messages are designed for one-time consumption. After the recipient successfully decrypts, the browser sends a one-time consume proof to the server.

If the proof matches what was stored for that message, the server deletes the ciphertext blob. This reduces long-term exposure. Instead of a permanent email thread living for years, the sensitive content exists only long enough to be delivered and read once.

“Privacy isn’t only encryption. It’s also deletion.”
One-Time Read and Self-Destruct

What Wasabi Servers See

The Server SeesThe Server NEVER Sees
Encrypted ciphertext blobPlaintext message
Salt and NonceAccess code or Derived key
Message IDDecrypted content
Routing fields (Recipient email)The identity of the "key"
“We store the lockbox, not the key.”
What Wasabi Servers See

Threat Model Coverage

Wasabi is built to stay secure even when the environment is hostile:

“Assume breach. Design anyway.”
Threat Model Coverage

Use Cases

Wasabi is for situations where email is too risky and permanence is unacceptable:

“When you don’t want a thread, send a Wasabi.”
Use Cases

Built for Professionals

Wasabi is designed for real workflows: fast compose, fast deliver, and a simple read flow. It fits incident response, executive comms, and legal handoffs perfectly.

It also fits everyday people who simply want private communication without trusting a mail provider’s storage forever. It is built for privacy-first teams who understand that email is for talking, but Wasabi is for secrets.

“Simple enough for everyone. Strong enough for security teams.”
Built for Professionals and Real Operations

Technical Flow Summary

For auditors and engineers, the process is transparent:

  1. Sender generates a random message_id, salt, and nonce.
  2. Sender derives a 256-bit key from the access code using Argon2id.
  3. Sender encrypts the message via XChaCha20‑Poly1305.
  4. Sender uploads the bundle; the server stores only the ciphertext.
  5. Recipient fetches the bundle and re-derives the key in-browser.
  6. Recipient decrypts; the server deletes the blob upon verification.
“Everything sensitive happens client-side. The server just delivers and deletes.”
Technical Flow Summary (For Auditors and Engineers)

Clear Security Promises

Wasabi is built around guarantees you can actually reason about:

“Security that can be explained, not marketing that must be believed.”
Clear Security Promises (What We Guarantee)

Open, Inspectable, and Auditable

Wasabi uses transparent client-side models. Encryption and decryption run inside the browser, making the workflow inspectable.

Security teams can verify that keys are derived client-side and that plaintext is not transmitted by reviewing network calls. Wasabi avoids proprietary “mystery crypto” and hidden server-side decryption steps.

“Trust is earned by architecture.”
Open, Inspectable, and Auditable

Wasabi vs Traditional Email Encryption

Traditional “secure email” often still relies on server-side portals or stored keys. Wasabi removes the mail system from the content path entirely.

Email is just the alert; the encrypted content lives as a ciphertext blob that only the access code can open. Fewer moving parts means fewer trust assumptions and fewer permanent copies.

“Don’t encrypt email. Replace it.”
Rocheston Wasabi vs Traditional Email Encryption

Best Practices

To use Wasabi safely:

“The code is the key. Protect it like one.”
Best Practices (How to Use Wasabi Safely)

Ready to Send?

Wasabi is hosted at wasabi.rocheston.com.

Compose your message, set an access code, send the link, and let Wasabi handle the rest. No plugins, no complicated key exchange—just secure delivery.

“Send once. Read once. Gone forever.”
Ready to Send Your First Private Message

Email Creates Permanent Forensic Evidence

Traditional email is replicated across systems you do not control. It exists in laptop caches, phone apps, smart watches, and cloud backups. Even if you delete it, the forensic footprint often remains in sync logs and backup snapshots.

Wasabi avoids this entire problem. Because the content is never delivered to the mail server, it is never synced into mail apps or indexed by search engines. The encrypted blob is fetched only when needed and deleted once read, dramatically reducing forensic residue.

“Email multiplies your message into a thousand copies. Wasabi keeps it from becoming an email in the first place.”
Email Creates Permanent Forensic Evidence

Immunity to Legal Compulsion

Because Rocheston does not possess the access code or the derived key, we cannot decrypt your messages. The message is encrypted before it ever reaches us.

If law enforcement or a third party serves a court order, we can only provide what we have: ciphertext and metadata. Without your access code, that data remains unreadable. We don’t have a "master key," because we designed the system so that only you hold the key.

“If we do not have the key, we cannot decrypt the message.”
Cannot Be Decrypted by the Server, Even Under Legal Compulsion

Comparisons (Apple, Microsoft, Google)

Wasabi vs Gmail

Gmail protects the "pipe" (TLS), but the provider still has access to the stored content for scanning and safety. Wasabi ensures the provider is "blind" to the content from the moment it is created.

Wasabi vs Apple iMessage

iMessage is excellent for E2EE within Apple's ecosystem, but cloud backups can change the exposure risk. Wasabi is built specifically for one-time secret delivery outside of any permanent ecosystem.

Wasabi vs Microsoft 365

Microsoft Purview is a compliance tool that often allows organizational oversight. Wasabi is a zero-knowledge tool where not even the organization or the service provider can see the content.

Wasabi vs Gmail Comparison

Why Gmail Is Not Enough for Secrets

Gmail’s default model is designed for safety and usability at scale: spam filtering, malware detection, indexing, search, and policy controls. That ecosystem works because messages are processed and stored in a readable form somewhere in the provider stack (even if they are protected in transit). Google’s own documentation focuses on transport encryption (TLS) as the standard protection for email delivery, which is not the same as end-to-end encryption by default.

Transport encryption protects delivery. It does not eliminate trusted servers.
Why Gmail Is Not Enough for Secrets

Gmail Confidential Mode Is Not End-to-End Encryption

Gmail Confidential Mode is primarily about restricting sharing actions (for example, no forward/copy/print/download) and adding expiry controls. It is not a guarantee of end-to-end encryption where only endpoints can decrypt. Google’s admin guidance describes these sharing restrictions; it is a control layer, not a cryptographic endpoint-only guarantee.

Controls help. Only encryption changes who can read.

Gmail End-to-End Encryption Developments

Google Workspace has been rolling out client-side encryption features branded as “end-to-end encryption” for business workflows, where encryption keys can be controlled by the customer. This is important progress, but it is not the default reality for typical Gmail use, and in some rollouts recipients may be directed through special viewing flows (for example guest access) depending on the recipient environment. If your audience is general Gmail users, it’s safest to assume Gmail is not end-to-end encrypted by default.

Some enterprise workflows can be encrypted. Default email still behaves like email.

Email Creates Long-Term Forensic Evidence

Email naturally creates durable artifacts: mailbox copies, device sync caches, retention systems, backups, and activity history. This is why email is valuable in investigations and eDiscovery—because it creates a trail. Forensic writeups specifically discuss Gmail history records and mailbox activity artifacts as sources of investigative evidence.

Email is built to remember.

How Wasabi Protects You Differently

Wasabi removes email from the content path. The message is encrypted inside the sender’s browser using a key derived from the access code (Argon2id), then encrypted and authenticated (XChaCha20-Poly1305). The server stores only ciphertext plus required transport metadata. The recipient downloads ciphertext and decrypts in the browser using the access code. Email providers and gateways see only a link notification pointing to ciphertext, not the secret itself.

Email delivers the alert. Wasabi delivers the sealed message.

One-Time Delivery Reduces Retention Risk

Gmail messages can persist across mailboxes, devices, and retention layers for long periods. Wasabi is designed for one-time retrieval: after a successful read, the ciphertext blob is designed to be deleted, reducing the long-term exposure window. This is the core difference for secrets: Wasabi tries to minimize how long sensitive content exists as stored data in any mailbox-like system.

Secrets should not live forever in threads and backups.

The Real-World Security Difference

With Gmail-only messaging, you are trusting the provider and associated scanning/retention ecosystem with message content handling as part of normal operations. With Wasabi, you are trusting your email provider only to deliver a notification link, while confidentiality depends on client-side cryptography and the access code. If a Gmail account is compromised, an attacker may see the link notification, but cannot decrypt the Wasabi ciphertext without the access code.

Reduce trust. Reduce copies. Reduce exposure.

When to Use Gmail vs When to Use Wasabi

Use Gmail for everyday communication, collaboration, and discussions that benefit from searchable threads and long-term history. Use Wasabi when permanence is unacceptable: passwords and recovery codes, API keys and SSH keys, private configuration values, incident-response details, legal or HR-sensitive handoffs, partner confidential messages, and any secret you do not want replicated across multiple mailboxes and devices.

Communication belongs in email. Secrets belong in Wasabi.

Encryption Comparison Across Popular Services

People often assume “secure messaging” and “secure email” are the same. They are not. Some systems use true end-to-end encryption (only endpoints can decrypt). Others use encryption in transit and at rest, where the provider can still access readable content during processing or account recovery. Wasabi is designed as a zero-knowledge, client-side encrypted secret delivery system: the server stores ciphertext only and does not hold the access code or derived key.

Encryption is not a label. It is a trust boundary.

What Wasabi Uses

Wasabi encrypts the message in the sender’s browser before upload and decrypts only in the recipient’s browser after download. The access code never goes to the server. The server stores ciphertext plus required transport metadata. This is the core “zero-knowledge” idea: the service can deliver the message without possessing the key required to decrypt it.

The server delivers ciphertext. The user holds the key.

Apple iMessage on iPhone

Apple documents that iMessage protects messages and attachments with end-to-end encryption so only the sender and receiver can access the contents. Apple also states it does not store message content or attachments in a readable form on its servers because iMessage content is end-to-end encrypted.

iMessage is endpoint encrypted messaging inside the Apple ecosystem.

Apple iCloud Backups and Advanced Data Protection

iMessage is end-to-end encrypted in transit between devices, but backups are a separate topic. Apple explains that certain iCloud data categories are always end-to-end encrypted, and Advanced Data Protection (an optional setting) expands end-to-end encryption to additional categories such as iCloud Backup and Messages backup. This matters because cloud backups can change who can access content under account recovery or lawful access scenarios.

Messaging can be end-to-end, but backups decide long-term exposure.

Microsoft 365 and Outlook Default Encryption

Microsoft describes Microsoft 365 encryption as layered protection including encryption in transit and at rest (TLS/SSL, AES, etc.). This is strong protection for enterprise platforms, but it is not the same as automatic end-to-end encryption of email content between endpoints in all cases.

Transit and at-rest encryption protects the platform. End-to-end encryption changes who can read.

Microsoft Purview Message Encryption

Microsoft Purview Message Encryption (often called OME) is designed to help organizations send encrypted emails inside and outside their org. It improves confidentiality for recipients, but it is typically part of an enterprise security and compliance model rather than a “server knows nothing” zero-knowledge design. In many deployments, encryption and policy enforcement are managed by the organization’s Microsoft 365 environment.

Enterprise email encryption often includes enterprise control.

Microsoft S/MIME in Outlook

S/MIME is a classic email end-to-end encryption approach where recipients decrypt using certificates. Microsoft provides guidance for configuring S/MIME in Outlook and describes how encrypted mail is opened using available certificates/keystore. This can achieve true end-to-end encryption in email, but it requires certificate management, user setup, and PKI operational overhead.

S/MIME can be end-to-end, but it is heavy operationally.

Wasabi vs Apple vs Microsoft

At a high level: 1. Wasabi (Secret Delivery): client-side encryption + zero-knowledge server storage + one-time retrieval design. 2. Apple iMessage (Messaging): end-to-end encryption for iMessage content within Apple’s ecosystem; backup settings can affect long-term access. 3. Microsoft 365 / Purview (Enterprise Email): strong encryption in transit and at rest plus policy enforcement; can be very secure, but often not “server blind.” 4. S/MIME (Email E2EE): true email end-to-end encryption possible, but complex certificate lifecycle management. If your goal is “send a secret and do not leave it living forever in mailboxes,” Wasabi’s design choice is to keep the secret out of email entirely.

Wasabi is built for secrets. Email platforms are built for communication and retention.

When Wasabi Is the Better Fit

Wasabi is ideal when you want: * no secret content stored in mailboxes * minimal long-term retention of sensitive content * simple user flow without certificates or enterprise setup * strong client-side cryptography with a server that cannot decrypt stored content without the access code Use email encryption (Purview/S/MIME) when: * you must keep content in email systems for business workflows, compliance, or archiving * you need organization-managed controls, DLP, or governance Use iMessage when: * both parties are in the Apple ecosystem and messaging is the right channel.

Pick the tool that matches the threat model.

Wasabi Security Keywords & SEO

Keywords: Rocheston Wasabi, end-to-end encrypted messaging, client-side encryption, zero-knowledge messaging, one-time secret sharing, self-destruct messages, XChaCha20-Poly1305, Argon2id RFC 9106, secure message delivery, encrypted message link, confidential email alternative, privacy-first messaging.

“If search engines can index it, it was never private. Wasabi encrypts first.”

FAQ

Answers to common questions about Rocheston Wasabi, encryption, privacy, and one-time message delivery.

Security should be simple enough to use, and strong enough to trust.

What is Wasabi?

Rocheston Wasabi is a secure message delivery system for sending sensitive information without turning it into a permanent email message. Your secret is encrypted in your browser before upload, stored only as ciphertext on the server, and shared through a link notification. The recipient decrypts in their browser using the access code.

Is Wasabi end-to-end encrypted?

Yes. Encryption happens on the sender’s device (in the browser) and decryption happens on the recipient’s device (in the browser). The server stores only ciphertext and does not perform decryption.

Does Rocheston store my access code?

No. The access code is never sent to the server. It is used locally in your browser to derive an encryption key, and that derived key is not uploaded or stored.

What does the server actually store?

The server stores an encrypted ciphertext blob plus the minimum metadata required to deliver and retrieve it, such as the random salt and nonce needed for decryption, a message identifier, and routing fields for notification delivery. It does not store plaintext or your access code.

Can Wasabi messages be recovered after they are read?

Wasabi is designed for one-time delivery. After a successful read, the service is designed to delete the stored ciphertext blob. Once deleted, it is not intended to be recoverable through the Wasabi application.

What happens if someone steals the link?

The link only points to encrypted ciphertext. Without the access code, the content is designed to remain unreadable. If you suspect the link was exposed, do not share the access code and send a new Wasabi message with a new access code.

What happens if someone guesses the access code?

If the access code is weak, guessing becomes easier. Wasabi uses a memory-hard key derivation function to make guessing expensive per attempt, but your strongest defense is choosing a long passphrase. Use unique access codes and avoid short or reused codes.

Is Wasabi the same as Gmail Confidential Mode?

No. Confidential Mode is a sharing-control feature for email. Wasabi removes the secret from email entirely by encrypting it client-side and storing only ciphertext. With Wasabi, email is only a notification link, not the message content.

Does Wasabi prevent screenshots?

No system can fully prevent a recipient from recording what they can see (screenshots, photos, copying text). Wasabi’s goal is to prevent automatic replication and long-term storage in email systems by keeping the secret out of the mailbox and encrypting it end-to-end.

What are the best practices for using Wasabi safely?

Use long passphrases as access codes. Share the access code out-of-band when needed (call, in-person, separate channel). Use one message per secret. Never reuse the same access code across many messages. Send only to trusted recipients.

What cryptography does Wasabi use?

Wasabi uses modern, widely reviewed primitives: Argon2id for deriving a strong encryption key from your access code (with a random salt), and XChaCha20-Poly1305 authenticated encryption to protect confidentiality and detect tampering. The design binds encryption context to message identifiers so blobs cannot be swapped without detection.

Can the server decrypt my message under a court order?

Wasabi is designed so the server does not have your access code or derived key, and it stores only ciphertext. Without the access code, the server cannot decrypt the stored ciphertext. Under legal compulsion, the server can only provide the encrypted data and associated non-secret metadata it has stored.