Is Your Email Private? Part 1 of 3
In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Every birthday greeting or Dear John email, every complaint, rant or verbal purge we may have sent to our employers, credit companies, congressman or customer service rep is subject to delivery errors or outright interception.
How can this be? To answer that we need to understand how email works. For the vast majority of email users today, the email system they use consists of two servers providing incoming and outgoing services, SMTP and POP3.
The SMTP (Simple Mail Transfer Protocol) server handles the outgoing email. SMTP was designed years ago when plain ascii text was all there was to send via email. So, when you push the "Send" button in your email client, the SMTP server at your ISP (Internet Service Provider) connects with the incoming POP3 (Post Office Protocol ver. 3) server where you are sending the email. The servers have a short "chat" verifying that the email address you are trying to send to exists on the incoming POP3 server. Then the SMTP server passes the message to the POP3 server and the POP3 server puts the message into the recipient's email box. At no time during the process is your email encrypted to protect your privacy. The message could be intercepted at anytime during the process and read by anyone.
On occasion, email sent to you or by you may even be delivered to the wrong inbox and your private message is no longer private. A single misdirected message could expose you to all kinds of trouble depending upon it's content.
Well, no one wants to read your email right? Wrong! Have you ever heard of Carnivore? That's a system that the FBI uses to harvest all email traffic going through a network. How does this affect you? When the FBI hooks Carnivore up to your ISP's network because they suspect someone of dealing drugs or some other crime, Carnivore will filter through ALL email looking for keywords that relate to the crime in question. And because the search has to be intentionally vague, you may be sending a request for information about a prescription drug you take and Carnivore will harvest your email to be read by a human agent. Suddenly, the drugs you're taking are now public knowledge. Spammers have also been known to harvest email addresses via captured emails.
OK - so now that you know the problem, what should you do about securing your privacy? It was hinted at earlier on... encryption! Learn how to use PGP (Pretty Good Privacy) to encrypt your email.
PGP uses a Public/Private key method to encrypt email. First you create a "Public" key. This is the key that others will use to encrypt email sent to you. Send this key to everyone you want to receive encrypted email from. Then you create a "Private" key. This is the key you use to decrypt any encrypted email sent to you. Safeguard this key well. It is the only thing that can decrypt your messages. If you tell someone what it is or loose it, your privacy is again compromised.
For more information on PGP and a free download visit: http://www.pgpi.org.
Next Time: Incorporating PGP into your email...
Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.
He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
Security alert: It’s time to update your iPhone — again NewsNation Now
OSCE in crisis as Russian veto threatens security body Financial Times
PM Modi lauds security official who worked at Bharat Mandapam amid G20 Summit despite mother's heart attack | Watch | Mint - Mint
PM Modi lauds security official who worked at Bharat Mandapam amid G20 Summit despite mother's heart attack | Watch | Mint Mint
Secretary Antony J. Blinken At the Addressing the Urgent Security Situation in Haiti Meeting - United States Department ... - Department of State
Secretary Antony J. Blinken At the Addressing the Urgent Security Situation in Haiti Meeting - United States Department ... Department of State
Mozambique-U.S. seek to deepen defence, security ties Africanews English
Rules Committee Hearing on Funding Bills for Homeland Security, State, Defense, and Agriculture Departments - C-SPAN
Rules Committee Hearing on Funding Bills for Homeland Security, State, Defense, and Agriculture Departments C-SPAN
TSA showcases security checkpoint technologies in use at Antonio ... - Transportation Security Administration
TSA showcases security checkpoint technologies in use at Antonio ... Transportation Security Administration
Biden-Harris Administration Announces Final National Security ... US Department of Commerce
United States Hosts UNGA Side Event: Addressing the Urgent ... Department of State
Austin Lauds Mozambique's Leadership on Regional Security > U.S Department of Defense
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Five questions with security expert Greg Parker Johnson Controls
Operation Lone Star Bolsters Border Security To Stem Historic Influx Office of the Texas Governor
Software supply chain security Grant Thornton
Increased online security coming soon to El Camino El Camino College Union
TSA canines enhancing security at John F. Kennedy International ... - Transportation Security Administration
TSA canines enhancing security at John F. Kennedy International ... Transportation Security Administration
Fact Sheet: The Biden-Harris Administration Takes New Actions to ... Homeland Security
Secretary Antony J. Blinken At United Nations Security Council ... Department of State
At Disagree Better Event, National Security Experts Warn of the ... - National Governors Association
At Disagree Better Event, National Security Experts Warn of the ... National Governors Association
DHS Homeland Security Investigations Announces Strategy to ... Homeland Security
Statement by President Charles Michel at the UN Security Council ... - Présidence française du Conseil de l'Union européenne 2022
Statement by President Charles Michel at the UN Security Council ... Présidence française du Conseil de l'Union européenne 2022
CU Boulder earns $5 million award for 5G cellular security research - CU Boulder's College of Engineering & Applied Science
CU Boulder earns $5 million award for 5G cellular security research CU Boulder's College of Engineering & Applied Science
Diving Deep Into Key Input on the Access Control Market Security Sales & Integration
Building the Quad: A Diamond of National Security United States Army
Job Security Isn't Enough to Keep Many Accountants From Quitting The Wall Street Journal
Security guards are first line of defense at Fort Wainwright United States Army
GEN Nakasone Offers Insight into Future of Cybersecurity and SIGINT National Security Agency
Unlocking IoT Endpoint Security in 2023: What You Need to Know Security Boulevard
Indiana University Health reports data security incident pertaining to one of its vendors - FOX 59 Indianapolis
Indiana University Health reports data security incident pertaining to one of its vendors FOX 59 Indianapolis
30th Security Forces Squadron Expeditionary Training ... Vandenberg Space Force Base
At the edge of the UN security perimeter, those with causes (and ... Chattanooga Times Free Press
ROSEN, TRUSTED INVESTOR COUNSEL, Encourages NAPCO ... GlobeNewswire
Airport Security Officer Caught Stealing From Passenger, Stuffs ... View from the Wing
Secretary Mayorkas Delivers Remarks at Ukrainian Cultural Artifacts ... Homeland Security
Fleeing Militants Pose Challenge to Somalia’s Security Voice of America - VOA News
LastPass: 'Horse Gone Barn Bolted' is Strong Password – Krebs on ... Krebs on Security
Remarks by Ambassador Thomas-Greenfield at a UN Security ... U.S. Embassy Moscow
Robert Habeck on Germany's new approach to 'economic security ... Atlantic Council
Ambassador Linda Thomas-Greenfield Joins Secretary Blinken for ... - United States Mission to the United Nations
Ambassador Linda Thomas-Greenfield Joins Secretary Blinken for ... United States Mission to the United Nations
Why We're Pulling Our Recommendation of Wyze Security Cameras The New York Times
Chicago Mayor Signs $29 Million Deal With Private Security Firm To Create Tent Camps For Migrants - Forbes
Chicago Mayor Signs $29 Million Deal With Private Security Firm To Create Tent Camps For Migrants Forbes
D.C. Dispatch: Lawmakers call for Russian reparations, border ... Iowa Capital Dispatch
Security Forces Teargas, Arrest Family Of Protester Killed In Iran ایران اینترنشنال
146th Security Forces Squadron Train with Emergency Management ... 146aw.ang.af.mil
Reporting Internet Scams
When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams.
Is Adware - Spyware Putting Your Privacy at Risk
Do you sometimes notice your computer running slower. Is your computer acting strange almost like its possessed? Well, it just may be plagued with Spyware.
Behavior to Stay Safer Online
1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan.
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger.
Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders
Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties.
Virus Nightmare..Lessons Learned
I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords.
Watching the Watchers: Detection and Removal of Spyware
If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you.
Dialing Up a Scam: Avoiding the Auto-Dialer Virus
For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine - or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.Now, imagine coming across your phone bill, thicker and heavier than normal.
Its War I Tell You!
There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same.
Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange.
Are You Surfing Safe?
Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on.
Be Aware of Phishing Scams!
If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U.
Internet Identity Theft - How You Can Shield Yourself
With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan.
Web Browsing - Collected Information
You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.
The One Critical Piece Of Free Software Thats Been Overlooked
Can You Prevent Spyware, Worms, Trojans, Viruses,..
Blogs as Safe Haven for Cybercriminals?
To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs.
IPv6 - Next Step In IP Security
IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.
Hacked: Who Else Is Using Your Computer?
A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain.
What Every Internet Marketer Should Know About Spyware
If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things.
Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda
Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing.
|home | site map|