Safety on the Information Superhighway

The results of the poll are in!

Have you been waiting with bated breath since our last newsletter?  The poll results to name the next Mula module are in. 

And the winner is...

The results of the poll are in! You cheeky monkeys voted for MulaX. How original!

However, when presented with the results of the poll, Patricia wrinkled her nose and slammed her office door. Actually, we're remote working, so she sent a message saying, "Not evocative enough." But I like my version better.

Now we're in a grey area. Does she technically have a veto? Are any of us brave enough or stupid enough to ask her?

So just like an 80's television drama, it's to be continued… (wavy effect, oh wait, that's a flashback, nevermind). 

Don't worry, though; our newsletter doesn't end there...

Back to our regularly scheduled program

Did you know that Mula passwords can’t be hacked? At least not in the traditional sense of a guy in his mom’s basement sort of thing.

Passwords, as we know them, allow a user to access their information. Let’s call this authentication.

The problem here is that not all passwords are created equal, and not all passwords are good passwords. 

Hackers can guess, steal, or even buy your password.

This is where Mula is different. 

Your authentication isn't the password you use to gain entry. Your authentication is your private key.

Semantics, shemantics

I can hear you rolling your eyes and asking, how is a private key different from a password?

I’m so glad you asked! 

Of course, you’ve read our terribly informative newsletter all about public and private keys. So on with the show...

➔ Your private key isn't held on a remote mail server. Instead, it's held on your local server. 

This means that even if a hacker could get into the Mula servers, there's nothing for them to find except for a bunch of encrypted data that will take them a few hundred years to decrypt AND they still wouldn’t have your private key.

➔ Your private key is protected by your passphrase and should all else fail, backup words.

This means that a hacker can’t simply click on a link requesting to reset your passphrase. Even if we did have a password reset link, and even if the hacker had access to the email account that link that sent to, they’d still have to know your backup words to reset your passphrase. This is why we tell you to keep them in a very safe place.

➔ Your private key can only be used on a device that has your wallet on it.

This means that a hacker would have to have your MulaWallet installed AND have your private key paired with it. They can’t simply buy your private key on the dark web and run it on their phone or laptop. 

So if you’ve skimmed down this far but didn’t bother to read what was actually written, what you really need to know is that Mula’s combination of encryption, localization, and backup protection provide breathtaking security without so much as a blip on your radar.

Well, that was a rollicking good time! Want to have even more fun? Join us next week when we try to find out what Patricia meant by evocative and if anyone died in the process. 


Our flagship product is the Mula Platform. Signing up for MulaMail reserves your Mula Platform username.

Register your Mula username today by clicking here.

Due to the modular approach of the Mula Platform, you can activate one service without activating the others. 

If you’d like more information regarding the Mula Platform, check out our website.

And as always, if you don’t have any questions, you might enjoy this Greek BBQ octopus recipe. 

For everything else, stay subscribed to our Substack!