When we started Agni, we asked a simple question: what happens if someone gains root access to our servers? For most cloud services, the answer is catastrophic. Emails, files, and metadata are all plaintext or trivially decryptable.
We chose a different path. In Agni's architecture, the server never possesses decryption keys. When you create an AgniMail account, your PGP private key is generated in your browser, encrypted with your password, and the ciphertext is stored on our servers. We cannot decrypt it. We cannot read your emails. We cannot hand over plaintext to anyone — because we don't have it.
Technical implications
This design choice makes some features harder. We can't do server-side search. We can't recover forgotten passwords (we can only reset them, which creates a new key). We can't scan for spam using server-side ML models.
But these trade-offs are worth it. The threat model we optimize for is not a script kiddie guessing passwords — it's a nation-state with a court order. In that scenario, we can truthfully say: we have nothing to give you.