Changes

Email

270 bytes added, 8 years ago
added threat
{{Scenario Task
|Scenario Task Format=Scenario
|Scenario Task Type=Profiling your identity and actions, Surveillance|Scenario Task Description=To send or not to send - that is the question! Email And it is not a rhetorical one: email is an all consuming (and incredibly ancient) part of our digital lives, but it is also very ancient, and in the years its 30-year-old design hasn't improved much in terms of security.  Email still functions on [httpsis basically made of two parts://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol protocols] designed over 30 years ago the "body", with only a few notable improvements the content of the message, and the "header", with regards information on the author of the email, the person it has been sent to security, the time when it was sent, etc. An incredible amount of All this information, called [https://en.wikipedia.org/wiki/Metadata metadata] , can be gathered from email recordsand turned into a pattern, which as can be witnessed seen on [https://immersion.media.mit.edu/ the Immersion project from MIT]. The content of the messages however, on the other hand, can be protected , and the various questions you may have about how to secure your email are answered in this section.<br /> Other good introductory guides to email security include the [https://en.flossmanuals.net/basic-internet-security/ch022_introduction-to-email-safety Introduction to email safety] from Floss Manuals and the multi-lingual [https://securityinabox.org/en/guide/secure-communication secure communications] chapter from of the Security in-a-box project.
}}