Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Is Your Email Private? Part 1 of 3 > NetSparsh - Viral Content you Love & Share

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Every birthday greeting or Dear John email, every complaint, rant or verbal purge we may have sent to our employers, credit companies, congressman or customer service rep is subject to delivery errors or outright interception.

How can this be? To answer that we need to understand how email works. For the vast majority of email users today, the email system they use consists of two servers providing incoming and outgoing services, SMTP and POP3.

The SMTP (Simple Mail Transfer Protocol) server handles the outgoing email. SMTP was designed years ago when plain ascii text was all there was to send via email. So, when you push the "Send" button in your email client, the SMTP server at your ISP (Internet Service Provider) connects with the incoming POP3 (Post Office Protocol ver. 3) server where you are sending the email. The servers have a short "chat" verifying that the email address you are trying to send to exists on the incoming POP3 server. Then the SMTP server passes the message to the POP3 server and the POP3 server puts the message into the recipient's email box. At no time during the process is your email encrypted to protect your privacy. The message could be intercepted at anytime during the process and read by anyone.

On occasion, email sent to you or by you may even be delivered to the wrong inbox and your private message is no longer private. A single misdirected message could expose you to all kinds of trouble depending upon it's content.

Well, no one wants to read your email right? Wrong! Have you ever heard of Carnivore? That's a system that the FBI uses to harvest all email traffic going through a network. How does this affect you? When the FBI hooks Carnivore up to your ISP's network because they suspect someone of dealing drugs or some other crime, Carnivore will filter through ALL email looking for keywords that relate to the crime in question. And because the search has to be intentionally vague, you may be sending a request for information about a prescription drug you take and Carnivore will harvest your email to be read by a human agent. Suddenly, the drugs you're taking are now public knowledge. Spammers have also been known to harvest email addresses via captured emails.

OK - so now that you know the problem, what should you do about securing your privacy? It was hinted at earlier on... encryption! Learn how to use PGP (Pretty Good Privacy) to encrypt your email.

PGP uses a Public/Private key method to encrypt email. First you create a "Public" key. This is the key that others will use to encrypt email sent to you. Send this key to everyone you want to receive encrypted email from. Then you create a "Private" key. This is the key you use to decrypt any encrypted email sent to you. Safeguard this key well. It is the only thing that can decrypt your messages. If you tell someone what it is or loose it, your privacy is again compromised.

For more information on PGP and a free download visit: http://www.pgpi.org.

Next Time: Incorporating PGP into your email...

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Vanity Fair

Forget the Summit: How Trump Let Putin Win the Cyber-Security War
Vanity Fair
As the White House trained its attention on the spectacle surrounding the meeting of Donald Trump and Vladimir Putin in Helsinki, the Trump administration was largely ignoring a more potent danger back home. The Trump-Putin summit, after all, is mostly ...
Trump stresses Israel's security in talks with PutinReuters
The Early Edition: July 16, 2018Just Security
Putin: Trump 'paid particular attention' to Israel's security at summitThe Jerusalem Post
Foreign Policy -Axios -Haaretz
all 2,777 news articles »

Forbes

Lack of confidence in data security can cost you more than you think
CSO Online
Leading the way to a new era of data protection, the long-awaited GDPR has emphasized the importance of data security more than ever before. Besides tarnishing their reputation, businesses face the risk of encountering large fines if they don't align ...
How GDPR Will Affect Privacy And Security Standards In US Health CareForbes

all 24 news articles »

CNBC

Tech consumers should not be forced to sacrifice privacy for security
CNBC
We all expect privacy, especially when it comes to our phones. But how do we feel about upholding the privacy of criminals and terrorists? And what should we do if the information needed to catch or prosecute a criminal – or potentially save lives – is ...


107.180.56.147 (press release) (blog)

Chicago DHSChemSecurityTalks Focus on Midwest Chemical Security
107.180.56.147 (press release) (blog)
To address these issues and more, the Department of Homeland Security (DHS) will hold the second of three DHSChemSecurityTalks events in Chicago on July 19. The first event took place last month in Oakland, California. The Chicago event provides a ...


The Nation.

The United States Has a National-Security Problem—and It's Not What You Think
The Nation.
So effectively has the Beltway establishment captured the concept of national security that, for most of us, it automatically conjures up images of terrorist groups, cyber warriors, or “rogue states.” To ward off such foes, the United States maintains ...


Curbed NY

NYC security deposits unfairly burden low-income New Yorkers: report
Curbed NY
New York City Comptroller Scott Stringer is calling on the state to impose limits on security deposits, which he says unfairly burdens low-income New Yorkers. The Comptroller's office has put out a new report that shows that New Yorkers sunk $507 ...
Report: NYC Apartment Security Deposits Are Too Damn HighGothamist
Stringer wants one-month cap on renters' security depositsThe Real Deal
New York City proposes sweeping new rules for security depositsHousingWire

all 6 news articles »

Forbes

Alight Solutions' Jason Lish Takes Unusual Path From Chief Security Officer To CIO
Forbes
Jason Lish was recently promoted to Chief Information Officer of $2.3 billion Alight Solutions. As CIO, he is responsible for Alight's overall digital, technology, enterprise risk and security strategy, and execution. Lish also leads the team charged ...


Forbes

To Grow The Internet Of Things, Improve Security
Forbes
The Internet of Things continues to grow rapidly, but concerns about security remain a significant barrier and are hindering the adoption of IoT devices. Research by Bain & Company finds that enterprise customers would be willing to buy more IoT ...

and more »

CNBC

Europeans are giving Trump a defiant runaround on trade and security
CNBC
As a presidential candidate, Donald Trump began telling the Europeans in 2015 that they had to: (a) cut their systematic and excessive trade surpluses with the U.S., (b) eliminate discriminatory trade rules and practices to open up markets for American ...
Globalised business is a US security issueFinancial Times

all 345 news articles »

TMZ

TI Charged for Assaulting Security Guard ... Likely Faces No Jail Time
TMZ
Prosecutors in Henry County charged the rapper with simple assault, public drunkenness and disorderly conduct stemming from his arrest back in May, when a security guard refused to let him into the premises. T.I.'s lawyer, Steve Sadow, tells TMZ the ...

and more »
Google News

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More