Difference between revisions of "Email"

m (added threat)
 
(10 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{Scenario Task
 
{{Scenario Task
 
|Scenario Task Format=Scenario
 
|Scenario Task Format=Scenario
|Scenario Task Description=To send or not to send - that is the question! Email is an all consuming (and incredibly ancient) part of  our digital lives. Email still functions on [https://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol protocols] designed over 30 years ago with only a few notable improvements with regards to security. An incredible amount of [https://en.wikipedia.org/wiki/Metadata metadata] can be gathered from email records, which can be witnessed on [https://immersion.media.mit.edu/ the Immersion project from MIT]. The content of the messages however, can be protected and the various questions you may have about email are answered in this section.
+
|Scenario Task Type=Profiling your identity and actions, Surveillance
<br />
+
|Scenario Task Description=To send or not to send - that is the question! And it is not a rhetorical one: email is an all consuming part of  our digital lives, but it is also very ancient, and in the years its 30-year-old design hasn't improved much in terms of security.
Other good introductory guides to email security include [en.flossmanuals.net/basic-internet-security/ch022_introduction-to-email-safety Introduction to email safety from Flossmanuals] and the multi-lingual [https://securityinabox.org/en/guide/secure-communication secure communications] introduction from the Security in-a-box project.
+
 
 +
Email is basically made of two parts: the "body", with the content of the message, and the "header", with information on the author of the email, the person it has been sent to, the time when it was sent, etc. All this information, called [https://en.wikipedia.org/wiki/Metadata metadata], can be gathered from email records and turned into a pattern, as can be seen on [https://immersion.media.mit.edu/ the Immersion project from MIT]. The content of the messages, on the other hand, can be protected, and the various questions you may have about how to secure your email are answered in this section.<br />
 +
 
 +
Other good introductory guides to email security include the [https://en.flossmanuals.net/basic-internet-security/ch022_introduction-to-email-safety Introduction to email safety] from Floss Manuals and the multi-lingual [https://securityinabox.org/en/guide/secure-communication secure communications] chapter of the Security in a box project.
 
}}
 
}}

Latest revision as of 16:01, 27 November 2015



Scenario- Profiling your identity and actions Surveillance


To send or not to send - that is the question! And it is not a rhetorical one: email is an all consuming part of our digital lives, but it is also very ancient, and in the years its 30-year-old design hasn't improved much in terms of security.

Email is basically made of two parts: the "body", with the content of the message, and the "header", with information on the author of the email, the person it has been sent to, the time when it was sent, etc. All this information, called metadata, can be gathered from email records and turned into a pattern, as can be seen on the Immersion project from MIT. The content of the messages, on the other hand, can be protected, and the various questions you may have about how to secure your email are answered in this section.

Other good introductory guides to email security include the Introduction to email safety from Floss Manuals and the multi-lingual secure communications chapter of the Security in a box project.

From here …



Translations
  Base Page Language Modification dateThis property is a special property in this wiki.
Fa/رایانامه Email fa 13 March 2016 11:46:00
Ru/Электронная почта Email ru 10 March 2016 13:32:17