I want to investigate other options
Solution- Surveillance Profiling your identity and actions Impersonation
Tools and Services: Peerio, Mega
The only way to be sure that your email conversation is truly confidential is to use end-to-end encryption technology. Aside from that you would need to either:
- Trust your email service provider. Please see To find a reliable email provider and ensure that your recipient uses the same provider, or
- Trust the provider of an encrypted messaging service (for example, that they have properly implemented their security algorithms and are resilient from any type of 3rd party interference).
Some suggestions for encrypted messaging services built as open-source software:
- https://peerio.com - encrypted messaging and file sharing where you don't need to learn about GPG encryption. Required for all recipients. Cannot be used with regular email addresses.
- https://mega.nz/ - encrypted online file storage. Mega allows you to share the file with another Mega user or externally, provided you can get the link to them securely.
You can always turn to a proprietary solution (e.g. http://www.symantec.com/desktop-email-encryption) but we cannot recommend any commercial solutions, especially those which do not disclose their code for inspection.
Base Page | Language | Modification dateThis property is a special property in this wiki. | |
---|---|---|---|
Fa/میخواهم ببینم گزینههای دیگر چیست | I want to investigate other options | fa | 29 March 2016 19:07:07 |
Ru/Я хочу изучить другие варианты | I want to investigate other options | ru | 22 March 2016 14:41:56 |