Transport: Multi-Provider Email Transport
Stateless adapters for Gmail, Outlook, and Yahoo handling both regular email and encrypted share operations. Includes deferred delivery for non-Xail recipients and WebRTC P2P acceleration.
The Problem
Email transport adapters for different providers are fragmented. No unified interface exists for sending both regular email and encrypted shares across Gmail, Outlook, and Yahoo.
Each email provider exposes a different API surface. Gmail uses REST with base64url message encoding. Microsoft Graph uses a JSON-based payload format. Yahoo requires IMAP over OAuth. Building reliable transport across all three means maintaining three completely separate codebases with different authentication, error handling, and rate limiting models.
When shares from XorIDA split operations need to be routed through these providers, the problem compounds. Each share must travel through a different provider to achieve channel independence, but the transport layer must handle this routing transparently without the application layer knowing which provider carries which share.
The Old Way
The PRIVATE.ME Solution
A unified TransportAdapter interface abstracts provider differences. One API for regular email, share routing, token refresh, and reconnection across Gmail, Outlook, and Yahoo.
The adapter pattern encapsulates provider-specific logic behind a common interface. Application code calls sendShare() or sendEmail() without knowing which provider handles the request. The transport layer automatically routes shares to the correct provider channel based on the sender's connected accounts.
Deferred delivery handles the case where a recipient is not yet on Xail: Share 1 is delivered as a "message waiting" teaser, Share 2 is held locally in a Pending folder until the recipient joins. When they do, the held share auto-delivers and the sender is notified.
The New Way
How It Works
The transport layer detects available provider channels, routes shares across independent channels for maximum security, handles token refresh transparently, and implements deferred delivery for non-Xail recipients.
Use Cases
Send regular email through Gmail, Outlook, or Yahoo with a single API call. Automatic token refresh, retry with exponential backoff, and rate limit handling.
3 providersRoute XorIDA shares across independent email channels automatically. Each share travels through a different provider for maximum channel independence and security.
split-channelWhen recipients are not on Xail, hold shares locally and deliver a "message waiting" teaser. Auto-deliver when the recipient joins and the sender is online.
viral growthWebRTC peer-to-peer channel for instant share delivery when both parties are online. Falls back to email channels when P2P is unavailable. Sub-second secure messaging.
WebRTCIntegration
import { createAdapter, sendShare } from '@private.me/transport'; // Create a provider adapter const gmail = createAdapter('gmail', oauthToken); // Send regular email await gmail.sendEmail({ to: 'recipient@example.com', subject: 'Hello', body: 'Regular email content', }); // Route an XorIDA share through this channel await sendShare(gmail, { share: shares[0], recipient: 'user@private.me.io', uuid: messageUuid, });
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Channel Independence | Multi-provider routing | Shares traverse separate infrastructure |
| Token Security | Memory-only storage | No persistent token exposure |
| Retry Safety | Exponential backoff | No duplicate share delivery |
| Format Integrity | Standard body format | Consistent share encoding |
| Deferred Security | Client-side share holding | No server-side share storage |
Ship Proofs, Not Source
Transport generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)
Use Cases
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/transport- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While Transport is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.