Information Liberation: Your Guide to the International Web by Jim Rion
Author:Jim Rion
Language: eng
Format: epub
Tags: Reference
Published: 2012-05-04T16:00:00+00:00
Email Encryption
You should always realize, when you send any information over the Internet there is a chance someone could intercept it. Commercial websites almost universally use some form of TLS or SSL encryption
to protect malicious interception of your personal data, but this is not usually the case for emails. Thus, if you are sending sensitive or even mildly personal data through your email, it’s up to you to protect it. Luckily, there are several ways you can do that.
One of the oldest applications of public source, freely available encryption software is PGP, or Pretty Good Privacy, Encryption. Established by Philip Zimmerman in 2002, but using work began in 1991, the PGP Corporation is now part of Symantec. Unfortunately, this means it’s now a paid service, but it offers an extremely robust and deeply comprehensive encryption suite that not only offers email protection, but can encrypt all your files and indeed your whole hard drive. It’s not cheap, but it is secure.
Free services do exist, and they offer specific security solutions for private users of all kinds. For Gmail users, there are a couple of useful applications. One, encipher.it, has been profiled on MakeUseOf here, and another that seems promising is a Greasemonkey script called, simply, Gmail Encrypt. Of course, there are solutions that aren’t specific to one email service, and you can find a good look at a few of them here.
One important thing to remember about email encryption, though, is that it adds one more layer of effort to your email access. Both the sender and receiver must have the same encryption keys, otherwise your emails and files will just be gibberish, so you will have to coordinate closely at both ends.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(14775)
The Mikado Method by Ola Ellnestam Daniel Brolund(12034)
Hello! Python by Anthony Briggs(11946)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11365)
Dependency Injection in .NET by Mark Seemann(11132)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10527)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9963)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9570)
Grails in Action by Glen Smith Peter Ledbrook(9289)
Hit Refresh by Satya Nadella(9039)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8891)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8756)
The Kubernetes Operator Framework Book by Michael Dame(8473)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8358)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8293)
Robo-Advisor with Python by Aki Ranin(8247)
Practical Computer Architecture with Python and ARM by Alan Clements(8222)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8192)
Building Low Latency Applications with C++ by Sourav Ghosh(8096)