You are on page 1of 3

Chat

26
26
26
22
22
22
22
21
21
21
view all > Latest Articles

Login | Register
Most Pirated Movies
neel4nil [18:42:27]:
ghostman i am scared
ghostman [18:42:51]:
scared over there?:))
neel4nil [18:43:06]:
hey dear where u from
neel4nil [18:43:15]:
ya ya
neel4nil [18:44:35]:
nice to meet u
ghostman [18:44:39]:
dear is considered another
ones lover here where im
from...so im not your dear
and dont call me that
neel4nil [18:47:32]:
Hahahaha ok np. then
'mate' or 'friend' or enemy
or people >:)
neel4nil [18:57:52]:
<:-P
Stargazer_Gold [19:25:20]:
:D
certifiedjustice
[19:49:04]:
/action afk
Stargazer_Gold [20:20:17]:
hello turkey
Stargazer_Gold [20:20:52]:
hello waffle
ihaveabluewaffle
[20:26:28]:
hi
Stargazer_Gold [20:26:50]:
hru today
hell777 [21:20:02]:
hii
hell777 [21:20:33]:
B-)
hell777 [21:20:50]:
The Hobbit An Unexpected
Journey (2012) (3D)
(1080p) (Dual Audio) by
hell777 torrent
Ejonndward [21:27:15]:
hi all
Ejonndward [21:28:56]:
goodnite all its been my
pleasure
ExtraTorrent.com > Articles > A Few Ways to Secure Your E-Mail
A Few Ways
to Secure
Your E-Mail
Added: Sunday, May
26th, 2013
Category: About
Torrents > Staying
Safe And Secure
Tags:ET, p2p, Torrent,
Piracy, Peer To Peer,
Network, Hackers,
Internet, BitTorrent,
Google, utorrent,
bitcomet, extratorrent,
www.extratorrent.com,
2013
Tweet Tweet
1
0
3
Like
It recently became known that in some cases the government may
read your private e-mails, which cant be good news for any citizen.
This is why security experts of different sources and Electronic
Frontier Foundation introduce a few ways to counter the
governments surveillance techniques.
The EFF has created a Surveillance Self-Defense website in order to
educate the US citizens about the law and technology of
government surveillance in the country. First of all, you should
know how your e-mail service works: the information is transferred
between the sender and the receiver through the wire, i.e.,
through other nodes/servers, and this is where the government
can get it.
1. End-to-end encryption
You can use such software as PGP (aka Pretty Good Privacy) and the GNU
Privacy Guard (GnuPG) to protect your transiting e-mails. They will also
secure stored information. When you use end-to-end encryption, you
ensure the privacy not just of your e-mails through the wire, but also of the
e-mails stored on your PC or other machines. Dont forget that these
programs work only if the receiver has them installed as well, and you
need to find and verify the receivers public keys.
2. Server-to-server encrypted transit
When you send an e-mail, its content usually passes through a chain of
SMTP mail servers. You can check e-mails headers to find out which servers
it passed through. Although most free e-mail providers dont encrypt your
messages when they pass the SMTP servers, you still can secure your e-
mails content when it transits those servers through TLS (Transport Layer
Security). Just make sure your e-mail provider supports this kind of
encryption.
3. Client-to-mail server encryption
If you use webmail services, check whether your e-mail provider uses the
HTTPS protocol. Hushmail.com, for example, always uses HTTPS, and also
provides end-to-end encryption. Then, even if webmail services use HTTPS
to their login page, they may switch back to HTTP after this step. In this
case you need to look for a configuration option or a browser plugin which
would keep the secure protocol enabled at all times. Gmail, for instance,
always enables the HTTPS security protocol.
4. Information stored on other PCs
A Few Ways to Secure
Your E-Mail
Plants to Power Your
Computer
Huawei Defends Itself from
Spying Allegations
7 Hackers & A Great Bank
Robbery
Facebook to Acquire Israeli
Start-Up for $1 billion
iPads Might Be Dangerous
for the Faint-Hearted
ExtraTorrent Spring
Contest
Germany Ready for Cyber
War
Antarctica Beat Hundred
Countries on Internet
Front
Google Australian Office is
Vulnerable
more p2p news on torrentfreak
Recommend us with Google
10k
Find us on Facebook
Extratorrent
Like
132,037 people like Extratorrent.
Previous article
Articles Categories
Articles Tags
certifiedjustice
[21:35:54]:
hey hell
To add new messages please
Login or Register for FREE
4. Information stored on other PCs
Unless you have your own private mail server, other machine gets your e-
mails. Your ISP or a webmail providers sent texts are traceable and
therefore can be accessed by third parties. Make sure to delete messages
from your ISP mail server after download or delete them after you finished
reading them. However, this cant guarantee 100% that the mail is forever
gone. In this case, the best way is to use PGP/GnuPG encrypted e-mails.
By:
SaM
May 26th,2013
Posted by: SaM
Date: Sunday, May 26th, 2013
Comments (8) (please add your comment )
1 posted by bubfred72 (2013-05-26 21:54:32)
Thx, for the info Sam, but will that really help
against government agencies?
2 posted by shenberry (2013-05-26 23:06:55)
They store all of our text messages, what will be
so different than email. You can use all t he
encryption you want, but if they really want your
emails, they will still get them. Damn shame no
more privacy for the common folks.
3 posted by Mr_3D (2013-05-27 01:47:34)
Superb info..thanks keep it up.
4 posted by Embolism (2013-05-27 03:00:34)
Pidgin along with pidgin encryption plugin is simple
to use and free to download 'sourceforge.net or
google it here is another usefull toolkit for those
who are less than clever in their anonymity :
sourceforge.net/projects/anononthego/?
source=directory -fortune favours the prepared
mind
5 posted by Embolism (2013-05-27 03:13:18)
@1 If you are really looking to go one step further
than encryption of your mail i.e passing state
secrets and both parties are using Linux, quite
easily you can open a secure tunnel but other
than that the above applications in anononthego
from sourceforge are all you really need,a word of
caution though when using secure applications
like Tor do not use 3rd party plugins like adobe
flash as you defeat the security of the
application,bon chance.
6 posted by Embolism (2013-05-27 03:27:21)
This link should help a little as well for those using
utorrent and has some q@A `s that are of
interest: schoolofprivacy.eu/ As always good
information SaM,thanks (:^D)
Recent Headlines Involving
File Sharing (1596)
Ridiculous Criminal Trials
(596)
Current Events (1000)
Bit Torrent Freedom (1093)
The Right To Share (528)
The Industries Of Records,
Gaming, Software, Movies
(530)
Movie Reviews (35)
Extra Torrent Related (80)
New Features (7)
ET Community (36)
Random Thoughts (8)
Interviews (6)
ExtraNews (23)
About Torrents (44)
Seeding Back (4)
Staying Safe And Secure
(40)
Geek Zone (57)
Themes And Skins (1)
Technology News (37)
Product Reviews (17)
Tutorials (2)
Headline News (18)
World Affairs (18)
Piracy extratorrent
bitcomet extratorrent.com
www.extratorrent.com
www.extrattorrent.com
Peer To Peer
Network .torrent
Internet BitTorrent
p2p 2010 Google
Hackers utorrent
ET File Sharing Extra Torrent
Torrent
7 posted by jensen2906 (2013-05-27 09:44:18)
Thanxx sam
8 posted by butt7722 (2013-05-27 14:56:19)
tnx sam well information
Home - Browse Torrents - Upload Torrent - Stat - Forum - Blog - FAQ - Login
ExtraTorrent.com is in compliance with copyrights

You might also like