Changes

Email

270 bytes added, 8 years ago
added threat
{{Scenario Task
|Scenario Task Format=Scenario
|Scenario Task Type=Profiling your identity and actions, Surveillance|Scenario Task Description=To send or not to send - that is the question! Email And it is not a rhetorical one: email is an all consuming (and incredibly ancient) part of our digital lives. Email still functions on [https://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol protocols] designed over 30 years ago with only a few notable improvements with regards to security. An incredible amount of [https://en.wikipedia.org/wiki/Metadata metadata] can be gathered from email records, which can be witnessed on [https://immersion.media.mit.edu/ the Immersion project from MIT]. The content of the messages howeverbut it is also very ancient, can be protected and in the various questions you may have about email are answered years its 30-year-old design hasn't improved much in this sectionterms of security.<br />
Email is basically made of two parts: the "body", with the content of the message, and the "header", with information on the author of the email, the person it has been sent to, the time when it was sent, etc. All this information, called [https://en.wikipedia.org/wiki/Metadata metadata], can be gathered from email records and turned into a pattern, as can be seen on [https://immersion.media.mit.edu/ the Immersion project from MIT]. The content of the messages, on the other hand, can be protected, and the various questions you may have about how to secure your email are answered in this section.<br /> Other good introductory guides to email security include the [https://en.flossmanuals.net/basic-internet-security/ch022_introduction-to-email-safety Introduction to email safety] from Floss Manuals and the multi-lingual [https://securityinabox.org/en/guide/secure-communication secure communications] chapter from of the Security in-a-box project.
}}