As I (very briefly) mentioned, it looks to me like Magma isn't ready for prime-time yet. I've seen reports that, for instance, the LDAP server allows completely insecure configurations (cleartext passwords on the wire) without so much as a warning. That sort of thing should not be possible with a product like this, and makes me think they're gluing together pre-existing code, which is also a little worrisome[1].
Beyond that, I tend to be pretty conservative with things like email. What you currently run, assuming it is configured correctly, is solid; I'd personally be hesitant to replace it until other folks have bled over the inevitable first bugs and it has been in use long enough for people to learn how to operate it, figure out any weirdness, etc. At the least, you'll be skipping what will probably be several point releases right after whenever they actually call it done.
TLDR; if I were you, I'd hold off. (And am personally holding off.) I'm very interested in this, in theory, but even though I am technical, I'm not a cryptographer or a security researcher, and even if I were I don't have the time to audit it. I want those folks to beat it up before I wade in.
[1] Nothing wrong with that in principle, but combined with the jagged edges, it makes me wonder how much attention any grafted code is actually getting.
Beyond that, I tend to be pretty conservative with things like email. What you currently run, assuming it is configured correctly, is solid; I'd personally be hesitant to replace it until other folks have bled over the inevitable first bugs and it has been in use long enough for people to learn how to operate it, figure out any weirdness, etc. At the least, you'll be skipping what will probably be several point releases right after whenever they actually call it done.
TLDR; if I were you, I'd hold off. (And am personally holding off.) I'm very interested in this, in theory, but even though I am technical, I'm not a cryptographer or a security researcher, and even if I were I don't have the time to audit it. I want those folks to beat it up before I wade in.
[1] Nothing wrong with that in principle, but combined with the jagged edges, it makes me wonder how much attention any grafted code is actually getting.