a few ways to secure your e-mail - extratorrent

3
Chat 26 26 26 22 22 22 22 21 21 21 view all > Latest Articles Login | Register Most Pirated Movies Stargazer_Gold [2 0 :2 6 :5 0 ]: hru today hell777 [2 1 :2 0 :0 2 ]: hii hell777 [2 1 :2 0 :3 3 ]: B-) hell777 [2 1 :2 0 :5 0 ]: The Hobbit An Unexpected Journey (2012) (3D) (1080p) (Dual Audio) by hell777 torrent Ejonndward [2 1 :2 7 :1 5 ]: hi all Ejonndward [2 1 :2 8 :5 6 ]: goodnite all its been my pleasure ExtraTorrent.com > Articles > A Few Ways to Secure Your E-Mail A Few Ways to Secure Your E-Mail Added: Sunday, May 26th, 2013 Category: About Torrents > Staying Safe And Secure Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.com, 2013 Tweet Tweet 1 0 3 Like It recently became known that in some cases the government may read your private e-mails, which can’t be good news for any citizen. This is why security experts of different sources and Electronic Frontier Foundation introduce a few ways to counter the government’s surveillance techniques. The EFF has created a Surveillance Self-Defense website in order to educate the US citizens about the law and technology of government surveillance in the country. First of all, you should know how your e-mail service works: the information is transferred between the sender and the receiver “through the wire”, i.e., through other nodes/servers, and this is where the government can get it. 1. End-to-end encryption You can use such software as PGP (aka Pretty Good Privacy) and the GNU Privacy Guard (GnuPG) to protect your transiting e-mails. They will also secure stored information. When you use end-to-end encryption, you ensure the privacy not just of your e-mails through the wire, but also of the e-mails stored on your PC or other machines. Don’t forget that these programs work only if the receiver has them installed as well, and you need to find and verify the receiver’s public keys. 2. Server-to-server encrypted transit When you send an e-mail, its content usually passes through a chain of SMTP mail servers. You can check e-mail’s headers to find out which servers it passed through. Although most free e-mail providers don’t encrypt your messages when they pass the SMTP servers, you still can secure your e- mail’s content when it transits those servers through TLS (Transport Layer Security). Just make sure your e-mail provider supports this kind of encryption. 3. Client-to-mail server encryption If you use webmail services, check whether your e-mail provider uses the HTTPS protocol. Hushmail.com, for example, always uses HTTPS, and also provides end-to-end encryption. Then, even if webmail services use HTTPS to their login page, they may switch back to HTTP after this step. In this case you need to look for a configuration option or a browser plugin which would keep the secure protocol enabled at all times. Gmail, for instance, always enables the HTTPS security protocol. 4. Information stored on other PCs A Few Ways to Secure Your E-Mail Plants to Power Your Computer Huawei Defends Itself from Spying Allegations 7 Hackers & A Great Bank Robbery Facebook to Acquire Israeli Start-Up for $1 billion iPads Might Be Dangerous for the Faint-Hearted ExtraTorrent Spring Contest Germany Ready for Cyber War Antarctica Beat Hundred Countries on Internet Front Google Australian Office is Vulnerable more p2p news on torrentfreak Recommend us with Google 10k Find us on Facebook Extratorrent Like 132,037 people like Extratorrent.

Upload: rajarajkumar543

Post on 19-Jan-2016

14 views

Category:

Documents


0 download

DESCRIPTION

E-Mail

TRANSCRIPT

Page 1: A Few Ways to Secure Your E-Mail - ExtraTorrent

Chat

26

26

26

22

22

22

22

21

21

21

view all >Latest Articles

Login | Register

Most Pirated Movies

neel4nil [18:42:27]:ghostman i am scared

ghostman [18:42:51]:scared over there?:))

neel4nil [18:43:06]:hey dear where u from

neel4nil [18:43:15]:ya ya

neel4nil [18:44:35]:nice to meet u

ghostman [18:44:39]:dear is considered anotherones lover here where imfrom...so im not your dearand dont call me that

neel4nil [18:47:32]:Hahahaha ok np. then'mate' or 'friend' or enemyor people >:)

neel4nil [18:57:52]:<:-P

Stargazer_Gold [19:25:20]::D

certifiedjustice[19:49:04]:/action afk

Stargazer_Gold [20:20:17]:hello turkey

Stargazer_Gold [20:20:52]:hello waffle

ihaveabluewaffle[20:26:28]:hi

Stargazer_Gold [20:26:50]:hru today

hell777 [21:20:02]:hii

hell777 [21:20:33]:B-)

hell777 [21:20:50]:The Hobbit An UnexpectedJourney (2012) (3D)(1080p) (Dual Audio) byhell777 torrent

Ejonndward [21:27:15]:hi all

Ejonndward [21:28:56]:goodnite all its been mypleasure

ExtraTorrent.com > Articles > A Few Ways to Secure Your E-Mail

A Few Ways

to Secure

Your E-MailAdded: Sunday, May26th, 2013Category: AboutTorrents > StayingSafe And SecureTags:ET, p2p, Torrent,Piracy, Peer To Peer,Network, Hackers,Internet, BitTorrent,Google, utorrent,bitcomet, extratorrent,www.extratorrent.com,2013

TweetTweet

1 0 3

Like

It recently became known that in some cases the government mayread your private e-mails, which can’t be good news for any citizen.This is why security experts of different sources and ElectronicFrontier Foundation introduce a few ways to counter thegovernment’s surveillance techniques.

The EFF has created a Surveillance Self-Defense website in order toeducate the US citizens about the law and technology ofgovernment surveillance in the country. First of all, you shouldknow how your e-mail service works: the information is transferredbetween the sender and the receiver “through the wire”, i.e.,through other nodes/servers, and this is where the governmentcan get it.

1. End-to-end encryption

You can use such software as PGP (aka Pretty Good Privacy) and the GNUPrivacy Guard (GnuPG) to protect your transiting e-mails. They will alsosecure stored information. When you use end-to-end encryption, youensure the privacy not just of your e-mails through the wire, but also of thee-mails stored on your PC or other machines. Don’t forget that theseprograms work only if the receiver has them installed as well, and youneed to find and verify the receiver’s public keys.

2. Server-to-server encrypted transit

When you send an e-mail, its content usually passes through a chain ofSMTP mail servers. You can check e-mail’s headers to find out which serversit passed through. Although most free e-mail providers don’t encrypt yourmessages when they pass the SMTP servers, you still can secure your e-mail’s content when it transits those servers through TLS (Transport LayerSecurity). Just make sure your e-mail provider supports this kind ofencryption.

3. Client-to-mail server encryption

If you use webmail services, check whether your e-mail provider uses theHTTPS protocol. Hushmail.com, for example, always uses HTTPS, and alsoprovides end-to-end encryption. Then, even if webmail services use HTTPSto their login page, they may switch back to HTTP after this step. In thiscase you need to look for a configuration option or a browser plugin whichwould keep the secure protocol enabled at all times. Gmail, for instance,always enables the HTTPS security protocol.

4. Information stored on other PCs

A Few Ways to SecureYour E-Mail

Plants to Power YourComputer

Huawei Defends Itself fromSpying Allegations

7 Hackers & A Great BankRobbery

Facebook to Acquire IsraeliStart-Up for $1 billion

iPads Might Be Dangerousfor the Faint-Hearted

ExtraTorrent SpringContest

Germany Ready for CyberWar

Antarctica Beat HundredCountries on InternetFront

Google Australian Office isVulnerable

more p2p news on torrentfreak

Recommend us with Google

10k

Find us on Facebook

Extratorrent

Like

132,037 people like Extratorrent.

Page 2: A Few Ways to Secure Your E-Mail - ExtraTorrent

« Previous article

Articles Categories

Articles Tags

certifiedjustice[21:35:54]:hey hell

To add new messages pleaseLogin or Register for FREE

4. Information stored on other PCs

Unless you have your own private mail server, other machine gets your e-mails. Your ISP or a webmail provider’s sent texts are traceable andtherefore can be accessed by third parties. Make sure to delete messagesfrom your ISP mail server after download or delete them after you finishedreading them. However, this can’t guarantee 100% that the mail is forevergone. In this case, the best way is to use PGP/GnuPG encrypted e-mails.

By:

SaM

May 26th,2013

Posted by: SaMDate: Sunday, May 26th, 2013

Comments (8) (please add your comment »)

1 posted by bubfred72 (2013-05-26 21:54:32)

Thx, for the info Sam, but will that really helpagainst government agencies?

2 posted by shenberry (2013-05-26 23:06:55)

They store all of our text messages, what will beso different than email. You can use all t heencryption you want, but if they really want youremails, they will still get them. Damn shame nomore privacy for the common folks.

3 posted by Mr_3D (2013-05-27 01:47:34)

Superb info..thanks keep it up.

4 posted by Embolism (2013-05-27 03:00:34)

Pidgin along with pidgin encryption plugin is simpleto use and free to download 'sourceforge.net orgoogle it here is another usefull toolkit for thosewho are less than clever in their anonymity :sourceforge.net/projects/anononthego/?source=directory -fortune favours the preparedmind

5 posted by Embolism (2013-05-27 03:13:18)

@1 If you are really looking to go one step furtherthan encryption of your mail i.e passing statesecrets and both parties are using Linux, quiteeasily you can open a secure tunnel but otherthan that the above applications in anononthegofrom sourceforge are all you really need,a word ofcaution though when using secure applicationslike Tor do not use 3rd party plugins like adobeflash as you defeat the security of theapplication,bon chance.

6 posted by Embolism (2013-05-27 03:27:21)

This link should help a little as well for those usingutorrent and has some q@A `s that are ofinterest: schoolofprivacy.eu/ As always goodinformation SaM,thanks (:^D)

Recent Headlines InvolvingFile Sharing (1596)

Ridiculous Criminal Trials(596)

Current Events (1000)

Bit Torrent Freedom (1093)

The Right To Share (528)

The Industries Of Records,Gaming, Software, Movies(530)

Movie Reviews (35)

Extra Torrent Related (80)

New Features (7)

ET Community (36)

Random Thoughts (8)

Interviews (6)

ExtraNews (23)

About Torrents (44)

Seeding Back (4)

Staying Safe And Secure(40)

Geek Zone (57)

Themes And Skins (1)

Technology News (37)

Product Reviews (17)

Tutorials (2)

Headline News (18)

World Affairs (18)

Piracy extratorrent

bitcomet extratorrent.com

www.extratorrent.com

www.extrattorrent.com

Peer To Peer

Network .torrent

Internet BitTorrent

p2p 2010 Google

Hackers utorrent

ET File Sharing Extra Torrent

Torrent