Maintain your old Siemens Hipath system

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Every birthday greeting or Dear John email, every complaint, rant or verbal purge we may have sent to our employers, credit companies, congressman or customer service rep is subject to delivery errors or outright interception.

How can this be? To answer that we need to understand how email works. For the vast majority of email users today, the email system they use consists of two servers providing incoming and outgoing services, SMTP and POP3.

The SMTP (Simple Mail Transfer Protocol) server handles the outgoing email. SMTP was designed years ago when plain ascii text was all there was to send via email. So, when you push the "Send" button in your email client, the SMTP server at your ISP (Internet Service Provider) connects with the incoming POP3 (Post Office Protocol ver. 3) server where you are sending the email. The servers have a short "chat" verifying that the email address you are trying to send to exists on the incoming POP3 server. Then the SMTP server passes the message to the POP3 server and the POP3 server puts the message into the recipient's email box. At no time during the process is your email encrypted to protect your privacy. The message could be intercepted at anytime during the process and read by anyone.

On occasion, email sent to you or by you may even be delivered to the wrong inbox and your private message is no longer private. A single misdirected message could expose you to all kinds of trouble depending upon it's content.

Well, no one wants to read your email right? Wrong! Have you ever heard of Carnivore? That's a system that the FBI uses to harvest all email traffic going through a network. How does this affect you? When the FBI hooks Carnivore up to your ISP's network because they suspect someone of dealing drugs or some other crime, Carnivore will filter through ALL email looking for keywords that relate to the crime in question. And because the search has to be intentionally vague, you may be sending a request for information about a prescription drug you take and Carnivore will harvest your email to be read by a human agent. Suddenly, the drugs you're taking are now public knowledge. Spammers have also been known to harvest email addresses via captured emails.

OK - so now that you know the problem, what should you do about securing your privacy? It was hinted at earlier on... encryption! Learn how to use PGP (Pretty Good Privacy) to encrypt your email.

PGP uses a Public/Private key method to encrypt email. First you create a "Public" key. This is the key that others will use to encrypt email sent to you. Send this key to everyone you want to receive encrypted email from. Then you create a "Private" key. This is the key you use to decrypt any encrypted email sent to you. Safeguard this key well. It is the only thing that can decrypt your messages. If you tell someone what it is or loose it, your privacy is again compromised.

For more information on PGP and a free download visit: http://www.pgpi.org.

Next Time: Incorporating PGP into your email...

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.

In The News:

Four children aged between 11 months and 13 years old found alive in jungle - 40 days after deadly plane crash
Sat, 10 Jun 2023 01:20:00 +0100
Four children have been found alive - five weeks after the plane they were travelling in crashed into thick jungle.

Sniffer dogs and half-eaten fruit: How children lost in the jungle after plane crash were found
Sat, 10 Jun 2023 07:35:00 +0100
In the deep depths of a Colombian jungle, four children have been found alive weeks after a deadly plane crash.

Five killed in blast at rocket and explosives factory in Turkey
Sat, 10 Jun 2023 09:34:00 +0100
An explosion at a rocket and explosives factory has killed five workers in Turkey, its defence ministry has said.

British girl stabbed in France knife attack 'able to leave hospital in coming days'
Sat, 10 Jun 2023 07:00:00 +0100
A three-year-old British girl who was stabbed in a knife attack in the French Alps will be able to leave hospital in the coming days, prosecutors have said.

Trump plays golf as indictment unsealed. How worried should he be?
Sat, 10 Jun 2023 00:15:00 +0100
Of all the chapters in the Donald Trump story, and there have been many, this moment is compelling. 



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More