Difference between revisions of "I want to investigate other options"
(added tools) |
|||
(6 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{Scenario Task | {{Scenario Task | ||
+ | |Scenario Task Format=Solution | ||
|Scenario Task Parent=To send an email that no one but me and the recipient can read | |Scenario Task Parent=To send an email that no one but me and the recipient can read | ||
|Scenario Task Type=Surveillance, Profiling your identity and actions, Impersonation | |Scenario Task Type=Surveillance, Profiling your identity and actions, Impersonation | ||
− | |Scenario Task Description=The only way to be sure that your email conversation is truly confidential | + | |Scenario Tools and Services=Peerio, Mega |
+ | |Scenario Task Description=The only way to be sure that your email conversation is truly confidential is to use [[I want to learn about encrypting email|end-to-end encryption]] technology. Aside from that you would need to either: | ||
− | + | *Trust your email service provider. Please see [[To find a reliable email provider]] and ensure that your recipient uses the same provider, or | |
− | *Trust your email service provider. Please see [[To find a reliable email provider]] and ensure that your recipient uses the same provider | + | *Trust the provider of an encrypted messaging service (for example, that they have properly implemented their security algorithms and are resilient from any type of 3rd party interference). |
− | *Trust the provider of an encrypted messaging service (for example, that they have properly implemented algorithms and | + | |
− | Some suggestions for encrypted messaging services built as open-source software | + | Some suggestions for encrypted messaging services built as open-source software: |
− | + | ||
− | You can always turn to a proprietary solution (e.g. http://www.symantec.com/desktop-email-encryption) | + | * https://peerio.com - encrypted messaging and file sharing where you don't need to learn about GPG encryption. Required for all recipients. Cannot be used with regular email addresses. |
+ | * https://mega.nz/ - encrypted online file storage. Mega allows you to share the file with another Mega user or externally, provided you can get the link to them securely. | ||
+ | |||
+ | You can always turn to a proprietary solution (e.g. http://www.symantec.com/desktop-email-encryption) but we cannot recommend any commercial solutions, especially those which do not disclose their code for inspection. | ||
}} | }} |
Latest revision as of 10:23, 26 November 2015
Solution- Surveillance Profiling your identity and actions Impersonation
Tools and Services: Peerio, Mega
The only way to be sure that your email conversation is truly confidential is to use end-to-end encryption technology. Aside from that you would need to either:
- Trust your email service provider. Please see To find a reliable email provider and ensure that your recipient uses the same provider, or
- Trust the provider of an encrypted messaging service (for example, that they have properly implemented their security algorithms and are resilient from any type of 3rd party interference).
Some suggestions for encrypted messaging services built as open-source software:
- https://peerio.com - encrypted messaging and file sharing where you don't need to learn about GPG encryption. Required for all recipients. Cannot be used with regular email addresses.
- https://mega.nz/ - encrypted online file storage. Mega allows you to share the file with another Mega user or externally, provided you can get the link to them securely.
You can always turn to a proprietary solution (e.g. http://www.symantec.com/desktop-email-encryption) but we cannot recommend any commercial solutions, especially those which do not disclose their code for inspection.
Base Page | Language | Modification dateThis property is a special property in this wiki. | |
---|---|---|---|
Fa/میخواهم ببینم گزینههای دیگر چیست | I want to investigate other options | fa | 29 March 2016 19:07:07 |
Ru/Я хочу изучить другие варианты | I want to investigate other options | ru | 22 March 2016 14:41:56 |