Signing up is Easy with Cyber-Rights.Net
Creating a FREE Cyber-Rights.Net Address
1.) Choose a username for use with your free Cyber-Rights.net address. If it is not available you may want to
try a Cyber-Rights.biz address.
3.) Follow the instructions on the next step to create you private and public keys, these are used to allow
encryption of messages. These keys are held and managed by the Hushmail system.
4.) Choose a secure passphrase. Try to include numbers and special characters. Be sure to note it down, Team
Hush or Cyber-Rights.Net cannot retrieve it for you if you lose it.
5.) You have succeeded! Login and begin communicating securely with HushMail!
6.) If the username you chose is not available, the system will suggest one for you or go back and re-start
the process from the http://www.cyber-rights.net/ site.
7.) Please make sure you read the
Hushmail/Cyber-Rights.Net Terms of Service
before you sign.
|
Please choose your desired username
|
Cyber-Rights.Net Comparison Matrix
Email Aliases: Send and receive email with unlimited @nym.hush.com email aliases. | | |
|
Secure Document Storage / File Sharing: Store your documents, and share them with other Hushmail users, securely! | | |
|
250 Mb additional storage for email and documents** | | |
|
Spam Control: Allow lists, Block lists, and Challenge-Response verification using the Human Authenticator™ | | |
|
IMAP Access to retrieve mail from your Cyber-Rights.Net account*** This feature will be available soon for the premium users | | |
|
Instant Messaging: Access to Hush Messenger, our encrypted instant messaging client | | |
|
Mail retrieval from external POP3 accounts. | | |
|
New email notification via Hush Messenger and email paging | | |
|
Ability to send and receive large attachments | | |
|
Unlimited Contacts in Address book | | |
|
Read Receipts, Auto-responders, Drafts, and Templates | | |
|
Access to Hushtools, our encryption toolkit | | |
|
Premium Technical Support | | |
|
Advertisement Free | | |
|
Online Help System | | |
|
No Deactivation due to inactivity | | |
|
2048 bit encryption with full Open PGP support (including Twofish, TripleDES, and RIPEMD160 | | |
|
Digital signature verification and signing capability for email and attachments | | |
|
End-to-End Encryption for Email and Attachments, and Secure Document Storage | | |
|
Early or exclusive access to new products and features | | |
|
** Requires additional paid subscription
*** Requires additional paid subscription, and use of IMAP compatible email client
|