Advancing Easy Privacy: p≡p Collaboration
Discover how ISOC-CH and p≡p foundation are standardizing automated encryption for seamless user privacy in digital communications.

In an era where digital communications are ubiquitous yet vulnerable, initiatives like pretty Easy privacy (p≡p) represent a beacon of hope for accessible security. This project, spearheaded by a strategic alliance between the Internet Society Switzerland Chapter (ISOC-CH) and the Swiss p≡p foundation, seeks to embed privacy into the core of internet protocols. Launched under a two-year Beyond the Net funding from the Internet Society, the effort titled “Implementing Privacy via Mass Encryption” focuses on formalizing p≡p protocols for widespread adoption.
The Imperative for Seamless Encryption
Traditional encryption tools, while robust, often demand technical savvy that deters average users. Manual key exchanges, fingerprint verifications, and configuration hurdles result in low adoption rates. p≡p flips this paradigm by automating these processes, leveraging existing standards like PGP/MIME to deliver end-to-end protection without intervention. The goal is clear: transform unencrypted messaging into the default secure mode, starting with email and extending to chats and SMS.
This approach aligns with the broader vision of “Privacy by Default,” where security activates automatically upon installation. By minimizing user friction, p≡p could dramatically increase encrypted traffic, shielding personal data from surveillance and breaches.
Key Pillars of the p≡p Framework
At its heart, p≡p operates on peer-to-peer principles, eschewing centralized servers for direct, trusted exchanges. Core components include:
- Automated Key Management: Keys generate and distribute seamlessly during initial contacts, syncing across devices without cloud dependency.
- Trust Rating System: Messages receive privacy scores—color-coded from red (untrusted) to green (fully secure)—providing intuitive feedback.
- Trustwords Innovation: Human-readable words replace cryptic fingerprints, enabling simple verbal or visual peer verification to thwart man-in-the-middle threats.
These elements build on established protocols, ensuring compatibility while introducing automation that feels intuitive, even for non-experts.
From Concept to IETF Standards
The collaboration’s cornerstone is advancing p≡p through the Internet Engineering Task Force (IETF), the arbiter of internet standards. Two pivotal drafts have emerged:
- General p≡p Principles (draft-birk-pep): Outlines automation for encryption in messaging, emphasizing peer synchronization and data minimization.
- Trustwords Protocol: Details mechanisms for authenticating peers, enhancing resilience against interception.
These documents, now in active discussion, pave the way for interoperable tools. Recent updates, like draft-pep-email-03 from May 2025, refine email formats for opportunistic encryption, prioritizing maximum privacy and legacy compatibility.
Multistakeholder Synergy Driving Progress
No single entity can overhaul internet privacy alone. ISOC-CH brings advocacy and funding expertise, while the p≡p foundation contributes technical innovation. This partnership exemplifies multistakeholderism, inviting developers, researchers, and policymakers to contribute. Events like CryptoParties have prototyped these ideas, proving their viability in real-world scenarios.
Broader ecosystem involvement includes integrations with email clients and messaging apps, fostering a network effect where more users amplify security for all.
Challenges and Pathways Forward
| Challenge | Impact | p≡p Solution |
|---|---|---|
| Usability Barriers | Low adoption | Zero-touch automation |
| MITM Vulnerabilities | Trust erosion | Trustwords verification |
| Interoperability | Fragmented security | IETF standardization |
| Scalability | Mass deployment hurdles | Peer-to-peer design |
Overcoming these requires rigorous testing and community feedback. Ongoing IETF working groups address edge cases, such as S/MIME interoperability, ensuring p≡p complements rather than competes with existing systems.
Real-World Implications for Users
Imagine sending an email that encrypts automatically, with a green badge confirming security—no settings tweaks needed. For businesses, this means compliant, private communications without training overheads. Privacy advocates gain a tool to push back against mass surveillance, aligning with GDPR and similar regulations emphasizing data protection by design.
Statistics underscore urgency: over 90% of emails remain unencrypted, per industry reports. p≡p’s mass encryption could reverse this, potentially securing billions of messages annually.
Future Horizons: Beyond Email
While email is the starting point, p≡p’s architecture supports expansion to XMPP, SMS, and emerging protocols. Anonymization features, where transport allows, further enhance protection. Long-term, integration with WebRTC or IoT could secure voice and device interactions, creating a privacy-first digital ecosystem.
Funding extensions and developer grants will accelerate this, with milestones targeting full IETF ratification by 2027.
Getting Involved
Contributions welcome: review IETF drafts, test p≡p adapters, or join ISOC-CH events. Developers can fork repositories on GitHub, while users download compatible apps today.
Frequently Asked Questions
What is p≡p?
p≡p is an open-source system automating end-to-end encryption for messages, making privacy effortless.
How does it differ from PGP?
p≡p builds on PGP but automates key handling and verification, removing manual steps.
Is p≡p free?
Yes, fully open-source and free for all uses.
Which platforms support it?
Adapters exist for major email clients, Android/iOS apps, with cross-platform sync.
When will it be standard?
IETF drafts are advancing; production tools expected soon post-review.
References
- pretty Easy privacy (pEp): Email Formats and Protocols (draft-pep-email-03) — H. Marques, B. Hoeneisen, pEp Project / IETF. 2025-05-22. https://datatracker.ietf.org/doc/draft-pep-email/
- pretty Easy privacy (pEp): Privacy by Default (draft-birk-pep-00) — Potaroo / IETF. 2018. https://www.potaroo.net/ietf/all-ids/draft-birk-pep-00.html
- Implementing Privacy via Mass Encryption: Standardizing pretty Easy privacy protocols — Internet Society Foundation. 2017. https://www.isocfoundation.org/project/implementing-privacy-via-mass-encryption-standarizing-pretty-easy-privacy-protocols/
- A Collaborative Effort for pretty Easy privacy (p≡p) — ISOC-CH. 2018. https://www.isoc.ch/a-collaborative-effort-for-pretty-easy-privacy-p≡p/
- Opportunistic Security: some protection most of the time (RFC 7435) — Y. Yi, Internet Engineering Task Force. 2015-02-16. https://datatracker.ietf.org/doc/html/rfc7435
Read full bio of Sneha Tete










