a few ways to secure your e-mail - extratorrent
DESCRIPTION
E-MailTRANSCRIPT
Chat
26
26
26
22
22
22
22
21
21
21
view all >Latest Articles
Login | Register
Most Pirated Movies
neel4nil [18:42:27]:ghostman i am scared
ghostman [18:42:51]:scared over there?:))
neel4nil [18:43:06]:hey dear where u from
neel4nil [18:43:15]:ya ya
neel4nil [18:44:35]:nice to meet u
ghostman [18:44:39]:dear is considered anotherones lover here where imfrom...so im not your dearand dont call me that
neel4nil [18:47:32]:Hahahaha ok np. then'mate' or 'friend' or enemyor people >:)
neel4nil [18:57:52]:<:-P
Stargazer_Gold [19:25:20]::D
certifiedjustice[19:49:04]:/action afk
Stargazer_Gold [20:20:17]:hello turkey
Stargazer_Gold [20:20:52]:hello waffle
ihaveabluewaffle[20:26:28]:hi
Stargazer_Gold [20:26:50]:hru today
hell777 [21:20:02]:hii
hell777 [21:20:33]:B-)
hell777 [21:20:50]:The Hobbit An UnexpectedJourney (2012) (3D)(1080p) (Dual Audio) byhell777 torrent
Ejonndward [21:27:15]:hi all
Ejonndward [21:28:56]:goodnite all its been mypleasure
ExtraTorrent.com > Articles > A Few Ways to Secure Your E-Mail
A Few Ways
to Secure
Your E-MailAdded: Sunday, May26th, 2013Category: AboutTorrents > StayingSafe And SecureTags:ET, p2p, Torrent,Piracy, Peer To Peer,Network, Hackers,Internet, BitTorrent,Google, utorrent,bitcomet, extratorrent,www.extratorrent.com,2013
TweetTweet
1 0 3
Like
It recently became known that in some cases the government mayread your private e-mails, which can’t be good news for any citizen.This is why security experts of different sources and ElectronicFrontier Foundation introduce a few ways to counter thegovernment’s surveillance techniques.
The EFF has created a Surveillance Self-Defense website in order toeducate the US citizens about the law and technology ofgovernment surveillance in the country. First of all, you shouldknow how your e-mail service works: the information is transferredbetween the sender and the receiver “through the wire”, i.e.,through other nodes/servers, and this is where the governmentcan get it.
1. End-to-end encryption
You can use such software as PGP (aka Pretty Good Privacy) and the GNUPrivacy Guard (GnuPG) to protect your transiting e-mails. They will alsosecure stored information. When you use end-to-end encryption, youensure the privacy not just of your e-mails through the wire, but also of thee-mails stored on your PC or other machines. Don’t forget that theseprograms work only if the receiver has them installed as well, and youneed to find and verify the receiver’s public keys.
2. Server-to-server encrypted transit
When you send an e-mail, its content usually passes through a chain ofSMTP mail servers. You can check e-mail’s headers to find out which serversit passed through. Although most free e-mail providers don’t encrypt yourmessages when they pass the SMTP servers, you still can secure your e-mail’s content when it transits those servers through TLS (Transport LayerSecurity). Just make sure your e-mail provider supports this kind ofencryption.
3. Client-to-mail server encryption
If you use webmail services, check whether your e-mail provider uses theHTTPS protocol. Hushmail.com, for example, always uses HTTPS, and alsoprovides end-to-end encryption. Then, even if webmail services use HTTPSto their login page, they may switch back to HTTP after this step. In thiscase you need to look for a configuration option or a browser plugin whichwould keep the secure protocol enabled at all times. Gmail, for instance,always enables the HTTPS security protocol.
4. Information stored on other PCs
A Few Ways to SecureYour E-Mail
Plants to Power YourComputer
Huawei Defends Itself fromSpying Allegations
7 Hackers & A Great BankRobbery
Facebook to Acquire IsraeliStart-Up for $1 billion
iPads Might Be Dangerousfor the Faint-Hearted
ExtraTorrent SpringContest
Germany Ready for CyberWar
Antarctica Beat HundredCountries on InternetFront
Google Australian Office isVulnerable
more p2p news on torrentfreak
Recommend us with Google
10k
Find us on Facebook
Extratorrent
Like
132,037 people like Extratorrent.
« Previous article
Articles Categories
Articles Tags
certifiedjustice[21:35:54]:hey hell
To add new messages pleaseLogin or Register for FREE
4. Information stored on other PCs
Unless you have your own private mail server, other machine gets your e-mails. Your ISP or a webmail provider’s sent texts are traceable andtherefore can be accessed by third parties. Make sure to delete messagesfrom your ISP mail server after download or delete them after you finishedreading them. However, this can’t guarantee 100% that the mail is forevergone. In this case, the best way is to use PGP/GnuPG encrypted e-mails.
By:
SaM
May 26th,2013
Posted by: SaMDate: Sunday, May 26th, 2013
Comments (8) (please add your comment »)
1 posted by bubfred72 (2013-05-26 21:54:32)
Thx, for the info Sam, but will that really helpagainst government agencies?
2 posted by shenberry (2013-05-26 23:06:55)
They store all of our text messages, what will beso different than email. You can use all t heencryption you want, but if they really want youremails, they will still get them. Damn shame nomore privacy for the common folks.
3 posted by Mr_3D (2013-05-27 01:47:34)
Superb info..thanks keep it up.
4 posted by Embolism (2013-05-27 03:00:34)
Pidgin along with pidgin encryption plugin is simpleto use and free to download 'sourceforge.net orgoogle it here is another usefull toolkit for thosewho are less than clever in their anonymity :sourceforge.net/projects/anononthego/?source=directory -fortune favours the preparedmind
5 posted by Embolism (2013-05-27 03:13:18)
@1 If you are really looking to go one step furtherthan encryption of your mail i.e passing statesecrets and both parties are using Linux, quiteeasily you can open a secure tunnel but otherthan that the above applications in anononthegofrom sourceforge are all you really need,a word ofcaution though when using secure applicationslike Tor do not use 3rd party plugins like adobeflash as you defeat the security of theapplication,bon chance.
6 posted by Embolism (2013-05-27 03:27:21)
This link should help a little as well for those usingutorrent and has some q@A `s that are ofinterest: schoolofprivacy.eu/ As always goodinformation SaM,thanks (:^D)
Recent Headlines InvolvingFile Sharing (1596)
Ridiculous Criminal Trials(596)
Current Events (1000)
Bit Torrent Freedom (1093)
The Right To Share (528)
The Industries Of Records,Gaming, Software, Movies(530)
Movie Reviews (35)
Extra Torrent Related (80)
New Features (7)
ET Community (36)
Random Thoughts (8)
Interviews (6)
ExtraNews (23)
About Torrents (44)
Seeding Back (4)
Staying Safe And Secure(40)
Geek Zone (57)
Themes And Skins (1)
Technology News (37)
Product Reviews (17)
Tutorials (2)
Headline News (18)
World Affairs (18)
Piracy extratorrent
bitcomet extratorrent.com
www.extratorrent.com
www.extrattorrent.com
Peer To Peer
Network .torrent
Internet BitTorrent
p2p 2010 Google
Hackers utorrent
ET File Sharing Extra Torrent
Torrent
7 posted by jensen2906 (2013-05-27 09:44:18)
Thanxx sam
8 posted by butt7722 (2013-05-27 14:56:19)
tnx sam well information
Home - Browse Torrents - Upload Torrent - Stat - Forum - Blog - FAQ - LoginExtraTorrent.com is in compliance with copyrights