In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Every birthday greeting or Dear John email, every complaint, rant or verbal purge we may have sent to our employers, credit companies, congressman or customer service rep is subject to delivery errors or outright interception.
How can this be? To answer that we need to understand how email works. For the vast majority of email users today, the email system they use consists of two servers providing incoming and outgoing services, SMTP and POP3.
The SMTP (Simple Mail Transfer Protocol) server handles the outgoing email. SMTP was designed years ago when plain ascii text was all there was to send via email. So, when you push the "Send" button in your email client, the SMTP server at your ISP (Internet Service Provider) connects with the incoming POP3 (Post Office Protocol ver. 3) server where you are sending the email. The servers have a short "chat" verifying that the email address you are trying to send to exists on the incoming POP3 server. Then the SMTP server passes the message to the POP3 server and the POP3 server puts the message into the recipient's email box. At no time during the process is your email encrypted to protect your privacy. The message could be intercepted at anytime during the process and read by anyone.
On occasion, email sent to you or by you may even be delivered to the wrong inbox and your private message is no longer private. A single misdirected message could expose you to all kinds of trouble depending upon it's content.
Well, no one wants to read your email right? Wrong! Have you ever heard of Carnivore? That's a system that the FBI uses to harvest all email traffic going through a network. How does this affect you? When the FBI hooks Carnivore up to your ISP's network because they suspect someone of dealing drugs or some other crime, Carnivore will filter through ALL email looking for keywords that relate to the crime in question. And because the search has to be intentionally vague, you may be sending a request for information about a prescription drug you take and Carnivore will harvest your email to be read by a human agent. Suddenly, the drugs you're taking are now public knowledge. Spammers have also been known to harvest email addresses via captured emails.
OK - so now that you know the problem, what should you do about securing your privacy? It was hinted at earlier on... encryption! Learn how to use PGP (Pretty Good Privacy) to encrypt your email.
PGP uses a Public/Private key method to encrypt email. First you create a "Public" key. This is the key that others will use to encrypt email sent to you. Send this key to everyone you want to receive encrypted email from. Then you create a "Private" key. This is the key you use to decrypt any encrypted email sent to you. Safeguard this key well. It is the only thing that can decrypt your messages. If you tell someone what it is or loose it, your privacy is again compromised.
For more information on PGP and a free download visit: http://www.pgpi.org.
Next Time: Incorporating PGP into your email...
Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.
He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
For many, the daily walk to the mailbox evokes mixed... Read More
There is no doubt that "how-to articles" have become a... Read More
So you want to know who your kids are chatting... Read More
Viruses are, however, not the only malicious software programs out... Read More
In today's times spyware is a very serious issue and... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Ok, you've got a computer, and you get online. You... Read More
Spyware is software that runs on a personal computer without... Read More
The top five online scams on the Internet hit nearly... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Do you really have to know how feeds work? Not... Read More
Having a good Spyware eliminator on your computer is vital... Read More
A couple of years back, I paid my dues the... Read More
Despite the current wave of identity theft and corporate security... Read More
Imagine my surprise when I received a phone call from... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Is your data secure? Think again. Securing data is unlike... Read More
At this point, if you've got the whole "turning the... Read More
Credit card fraud is a growing problem for online businesses... Read More
In recent days, I was one of the unfortunate persons... Read More
Nobody wants to pay to remove spyware. At the very... Read More
If you run any type of Internet business, Adware and... Read More
Huge number of spyware software applications are available in the... Read More
Every single time you access a website, you leave tracks.... Read More
They're out there. Individuals trying to make a quick buck... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
If you have used a Windows machine for a while,... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Threats we ordinary Web users face online leave us no... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
When it comes to reporting Internet scams most of us... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Is your data secure? Think again. Securing data is unlike... Read More
As more people are logging onto the Internet everyday, Network... Read More
Have you ever got an email asking you to confirm... Read More
There are ways to insure security though. You can get... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
First, let's do a little recap'. As I stated in... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
It's late. You've been scouring the web for that perfect... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Ok, you've got a computer, and you get online. You... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
The first thing people think about when defending their computers... Read More
In the past I've never really paid much attention to... Read More
Long gone are the days that we could feel secure... Read More
Can you protect your computer from all possible viruses and... Read More
In 1997, I decided after 15 years as a practicing... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Millions of people make purchases online, but many people are... Read More
Have you ever bought a product or service from the... Read More
Despite the current wave of identity theft and corporate security... Read More
Nowadays more and more people are using a computer. A... Read More
Spyware is software that runs on a personal computer without... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Some months ago, before there was much publicity regarding phishing... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Internet Security |