Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Is Your Email Private? Part 1 of 3 > NetSparsh - Viral Content you Love & Share

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Every birthday greeting or Dear John email, every complaint, rant or verbal purge we may have sent to our employers, credit companies, congressman or customer service rep is subject to delivery errors or outright interception.

How can this be? To answer that we need to understand how email works. For the vast majority of email users today, the email system they use consists of two servers providing incoming and outgoing services, SMTP and POP3.

The SMTP (Simple Mail Transfer Protocol) server handles the outgoing email. SMTP was designed years ago when plain ascii text was all there was to send via email. So, when you push the "Send" button in your email client, the SMTP server at your ISP (Internet Service Provider) connects with the incoming POP3 (Post Office Protocol ver. 3) server where you are sending the email. The servers have a short "chat" verifying that the email address you are trying to send to exists on the incoming POP3 server. Then the SMTP server passes the message to the POP3 server and the POP3 server puts the message into the recipient's email box. At no time during the process is your email encrypted to protect your privacy. The message could be intercepted at anytime during the process and read by anyone.

On occasion, email sent to you or by you may even be delivered to the wrong inbox and your private message is no longer private. A single misdirected message could expose you to all kinds of trouble depending upon it's content.

Well, no one wants to read your email right? Wrong! Have you ever heard of Carnivore? That's a system that the FBI uses to harvest all email traffic going through a network. How does this affect you? When the FBI hooks Carnivore up to your ISP's network because they suspect someone of dealing drugs or some other crime, Carnivore will filter through ALL email looking for keywords that relate to the crime in question. And because the search has to be intentionally vague, you may be sending a request for information about a prescription drug you take and Carnivore will harvest your email to be read by a human agent. Suddenly, the drugs you're taking are now public knowledge. Spammers have also been known to harvest email addresses via captured emails.

OK - so now that you know the problem, what should you do about securing your privacy? It was hinted at earlier on... encryption! Learn how to use PGP (Pretty Good Privacy) to encrypt your email.

PGP uses a Public/Private key method to encrypt email. First you create a "Public" key. This is the key that others will use to encrypt email sent to you. Send this key to everyone you want to receive encrypted email from. Then you create a "Private" key. This is the key you use to decrypt any encrypted email sent to you. Safeguard this key well. It is the only thing that can decrypt your messages. If you tell someone what it is or loose it, your privacy is again compromised.

For more information on PGP and a free download visit: http://www.pgpi.org.

Next Time: Incorporating PGP into your email...

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

Security Images Show Khashoggi and Fiancée in His Final Hours
New York Times
ISTANBUL — In the continuing frenzy of media attention to the murder of Jamal Khashoggi before a much-anticipated statement by President Recep Tayyip Erdogan, Turkish media have published poignant photographs of Mr. Khashoggi and his fiancée in the ...

and more »

Healthcare Finance News

Can't afford a security chief? Here are the alternatives
Healthcare Finance News
Particularly for smaller hospitals and medical groups, hiring a full-time chief information security officer can be a stretch of the budget and resources. But patient data must still be protected because smaller organizations face many of the same ...

and more »

Mashable

Japan is the latest country to challenge Facebook to improve security
Mashable
Japan's ask of Facebook comes after the social media company revealed that a security breach compromised the personal data of 29 million users. It also follows a year of scandal about how the British political consulting and data firm Cambridge ...

and more »

Forbes

Google And Our National Security: Lost In The Cloud?
Forbes
The experts all agree. The Pentagon and the U.S. military's future depends on advanced weapons systems that will require cooperation with America's most advanced technology companies, including the major players in Silicon Valley. But what if Silicon ...


NBC4 Washington

Security guard shoots intruder in lobby of local Fox station in DC, police say
CBS News
The man kicked through the glass doors of WTTG's Wisconsin Avenue studios before he was shot once by the armed security guard in the lobby around 3 p.m., Washington Metropolitan Police second district commander Melvin Gresham said. The station ...
Security Guard Shoots Man Trying to Get Into WTTG, Washington, DC, Fox StationNBC4 Washington
Security guard shoots man trying to break in to FOX 5 buildingWTOP
Security guard shoots man trying to enter DC local news station, authorities sayWSB Radio
FOX 5 DC -WBAL Baltimore
all 108 news articles »

Washington Post

Macedonia: Lawmakers who backed new name get more security
Washington Post
Interior Minister Oliver Spasovski said Monday that all 80 parliament members who backed launching the constitutional amendment process needed for the change were getting extra security after several lawmakers and their families reported death threats.

and more »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: October 13–19
Council on Foreign Relations (blog)
Below is a visualization and description of some of the most significant incidents of political violence in Nigeria from October 13 to October 19, 2018. This update also represents violence related to Boko Haram in Cameroon, Chad, and Niger. These ...


Voice of America

Relative: Victim of Brutal Ugandan Security Arrest Still Missing
Voice of America
Uganda's security forces are under scrutiny after a video surfaced showing plain clothed officers brutally beating and arresting a civilian on the street. Uganda's army spokesman says the troops are facing a disciplinary committee but the family of the ...

and more »

Today.com

After a break-in, I tried Amazon's best-selling $64 security camera
Today.com
I've always thought security cameras were something only businesses had. I also thought my garage was a safe space to store my Felt Racing bike. But on a Monday morning this past August, I realized I was wrong, on both counts. Thieves got into my ...

Google News

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More