PGP E-mail Encryption
#2
Join Date: Jul 2004
Location: The Big D
Programs: AA, CO, DL, WN, SPG Gold
Posts: 1,842
Hushmail is as good as I've seen for a free service. Also, the fact that the email header is completely anonymized (is that a word?) to 127.0.0.1 for the sender means no receiver can know where it was sent from via Hushmail.
#3
Original Poster
Join Date: Jan 2005
Location: IAH
Posts: 2,674
"Anonymized" is apparently becoming a word.
I am actually thinking of going dark on all my e-traffic due to security concerns.
(This of course would mean dropping off of the e-boards I goof around on. Do I hear cheers?
)
I'm particularly concerned with client data being intercepted. I'm looking at paid for services. mailvault.com looks pretty interesting, and they also sell a tunneler.
M8
I am actually thinking of going dark on all my e-traffic due to security concerns.
(This of course would mean dropping off of the e-boards I goof around on. Do I hear cheers?
)I'm particularly concerned with client data being intercepted. I'm looking at paid for services. mailvault.com looks pretty interesting, and they also sell a tunneler.
M8
#4
FlyerTalk Evangelist



Join Date: May 2000
Location: أمريكا
Posts: 26,931
You can get PGP through Phil Zimermmann's Web site (the father of PGP). The program comes with the PGP Mail plug-ins. I've used it with MS Outlook before and it's a pretty seamless integration.
http://www.philzimmermann.com/EN/sales/index.html
The problem with something like MailVault is that they store your private key on their servers. The biggest threat to the security of encryption is the security of your private key. How can you trust that this company is going to keep it secure? They'll have access to it, hackers and spies could get access to it, and possibly law enforcement.
If you are the only one with access to your key then you're in a much better position: anyone who wants to get access to your encrypted files would have to break both your key and your passphrase. If you use mailvault, all someone has to do is break into your account using a simple username/password combo, which is not particularly secure, then they'll have access to your private key. They may still have to break your passphrase (I'm assuming that MailVault doesn't store this for you).
Of course, it is probably easier to use a service like MailVault, but I'm not convinced that it's worth it for questionable security benefits. And you have no way of knowing how trustworthy these people are or what the "back end" of this thing looks like.
Finally, with MailVault you have no way of knowing if your security has been compromised. If you control your private key, you're in a much better position to know if it has been stolen.
http://www.philzimmermann.com/EN/sales/index.html
The problem with something like MailVault is that they store your private key on their servers. The biggest threat to the security of encryption is the security of your private key. How can you trust that this company is going to keep it secure? They'll have access to it, hackers and spies could get access to it, and possibly law enforcement.
If you are the only one with access to your key then you're in a much better position: anyone who wants to get access to your encrypted files would have to break both your key and your passphrase. If you use mailvault, all someone has to do is break into your account using a simple username/password combo, which is not particularly secure, then they'll have access to your private key. They may still have to break your passphrase (I'm assuming that MailVault doesn't store this for you).
Of course, it is probably easier to use a service like MailVault, but I'm not convinced that it's worth it for questionable security benefits. And you have no way of knowing how trustworthy these people are or what the "back end" of this thing looks like.
Finally, with MailVault you have no way of knowing if your security has been compromised. If you control your private key, you're in a much better position to know if it has been stolen.
Last edited by Doppy; Mar 3, 2006 at 7:31 pm
#5
Original Poster
Join Date: Jan 2005
Location: IAH
Posts: 2,674
Originally Posted by Doppy
You can get PGP through Phil Zimermmann's Web site (the father of PGP). The program comes with the PGP Mail plug-ins. I've used it with MS Outlook before and it's a pretty seamless integration.
http://www.philzimmermann.com/EN/sales/index.html
The problem with something like MailVault is that they store your private key on their servers. The biggest threat to the security of encryption is the security of your private key. How can you trust that this company is going to keep it secure? They'll have access to it, hackers and spies could get access to it, and possibly law enforcement.
If you are the only one with access to your key then you're in a much better position: anyone who wants to get access to your encrypted files would have to break both your key and your passphrase. If you use mailvault, all someone has to do is break into your account using a simple username/password combo, which is not particularly secure, then they'll have access to your private key. They may still have to break your passphrase (I'm assuming that MailVault doesn't store this for you).
Of course, it is probably easier to use a service like MailVault, but I'm not convinced that it's worth it for questionable security benefits. And you have no way of knowing how trustworthy these people are or what the "back end" of this thing looks like.
Finally, with MailVault you have no way of knowing if your security has been compromised. If you control your private key, you're in a much better position to know if it has been stolen.
http://www.philzimmermann.com/EN/sales/index.html
The problem with something like MailVault is that they store your private key on their servers. The biggest threat to the security of encryption is the security of your private key. How can you trust that this company is going to keep it secure? They'll have access to it, hackers and spies could get access to it, and possibly law enforcement.
If you are the only one with access to your key then you're in a much better position: anyone who wants to get access to your encrypted files would have to break both your key and your passphrase. If you use mailvault, all someone has to do is break into your account using a simple username/password combo, which is not particularly secure, then they'll have access to your private key. They may still have to break your passphrase (I'm assuming that MailVault doesn't store this for you).
Of course, it is probably easier to use a service like MailVault, but I'm not convinced that it's worth it for questionable security benefits. And you have no way of knowing how trustworthy these people are or what the "back end" of this thing looks like.
Finally, with MailVault you have no way of knowing if your security has been compromised. If you control your private key, you're in a much better position to know if it has been stolen.
Thanks ^
M8
#7
Original Poster
Join Date: Jan 2005
Location: IAH
Posts: 2,674
Laptop theft is my other concern. If I have PGP on my own machine can the e-mails be left encrypted on the laptop. I'm thinking the thieves would need to know the pass phrase in order to read anything that's left encrypted on the machine.
I did a test with hushmail. The note I sent to myself [from my hushmail account to my commercial account] directed me to their site where I had to type in a know phrase to decrypt. I'd like the same type of protection for my laptop. Anyone know if this is possible.
M8
I did a test with hushmail. The note I sent to myself [from my hushmail account to my commercial account] directed me to their site where I had to type in a know phrase to decrypt. I'd like the same type of protection for my laptop. Anyone know if this is possible.
M8
#8
FlyerTalk Evangelist




Join Date: Jun 2004
Location: LON, ACK, BOS..... (Not necessarily in that order)
Programs: **Mucci Diamond Hairbrush** - compared to that nothing else matters (+BA Bronze)
Posts: 15,938
Go for PGP if you want to stop almost everyone being able to read your mail. I was told by someone I trust, that the USG had only relaxed the encryption export laws when they had managed to figure a way of breaking most stuff easily. Although I wouldn't take this as fact, I don't see much reason to doubt it, I believe in theory that it could be done, using/compromising the OS on which the encryption software runs.
#9
Original Poster
Join Date: Jan 2005
Location: IAH
Posts: 2,674
Originally Posted by Jimmie76
Go for PGP if you want to stop almost everyone being able to read your mail. I was told by someone I trust, that the USG had only relaxed the encryption export laws when they had managed to figure a way of breaking most stuff easily. Although I wouldn't take this as fact, I don't see much reason to doubt it, I believe in theory that it could be done, using/compromising the OS on which the encryption software runs.
Anyway, I'm not worried about USG as much as I am about general theft and business type snoopers.
M8
#10
Join Date: Jul 2000
Location: Commuting around the mid-atlantic and rust-belt on any number of RJs
Programs: TSA Random Selectee Platinum, * Gold, SPG/HH/MR mid-tier, and a tiny bag of pretzels.
Posts: 9,255
Originally Posted by Jimmie76
Go for PGP if you want to stop almost everyone being able to read your mail. I was told by someone I trust, that the USG had only relaxed the encryption export laws when they had managed to figure a way of breaking most stuff easily. Although I wouldn't take this as fact, I don't see much reason to doubt it, I believe in theory that it could be done, using/compromising the OS on which the encryption software runs.
It's possible that the government made some breakthru in factoring or the underlying traditional crypto in PGP. It's far easier to simply tempest your machine or keylog it to figure your passphrase, though.
#11
FlyerTalk Evangelist



Join Date: May 2000
Location: أمريكا
Posts: 26,931
Originally Posted by Martinis at 8
Laptop theft is my other concern. If I have PGP on my own machine can the e-mails be left encrypted on the laptop. I'm thinking the thieves would need to know the pass phrase in order to read anything that's left encrypted on the machine.
Put your private key on a USB drive and have the drive implanted in your body, with only the plug sticking out. Then you can just plug yourself in as necessary, and if you lose the laptop, your files will still be secure.

Originally Posted by Jimmie76
Although I wouldn't take this as fact, I don't see much reason to doubt it, I believe in theory that it could be done, using/compromising the OS on which the encryption software runs.
Originally Posted by ClueByFour
It's far easier to simply tempest your machine or keylog it to figure your passphrase, though.

http://www.freedom-to-tinker.com/?p=893
#12
FlyerTalk Evangelist




Join Date: Jun 2004
Location: LON, ACK, BOS..... (Not necessarily in that order)
Programs: **Mucci Diamond Hairbrush** - compared to that nothing else matters (+BA Bronze)
Posts: 15,938
I know about the clipper chip, I looked into that myself whilst at Uni. However I've dug out the email I was sent containing a link about this, and that's I guess where he got his info from before talking to me.
Interesting stuff, although no certainty that its accurate!
Interesting stuff, although no certainty that its accurate!
Last edited by Jimmie76; Mar 3, 2006 at 10:57 pm
#13
Suspended
Join Date: Jul 2001
Location: Watchlisted by the prejudiced, en route to purgatory
Programs: Just Say No to Fleecing and Blacklisting
Posts: 102,077
Originally Posted by Martinis at 8
"Anonymized" is apparently becoming a word.
I am actually thinking of going dark on all my e-traffic due to security concerns.
(This of course would mean dropping off of the e-boards I goof around on. Do I hear cheers?
)
I am actually thinking of going dark on all my e-traffic due to security concerns.
(This of course would mean dropping off of the e-boards I goof around on. Do I hear cheers?
)
#14
Original Poster
Join Date: Jan 2005
Location: IAH
Posts: 2,674
Originally Posted by GUWonder
Tools to go "anonymous' in the same sort of way exists for e-boards too. There's always remote browsing too. Can you tell that I want you to stick around? And no, I don't need The Little Back Book. 

What's a Little Back Book?
#15
Original Poster
Join Date: Jan 2005
Location: IAH
Posts: 2,674
Originally Posted by ClueByFour
No. They relaxed the laws once it became clear that the proverbial cat was out of the bag, it was perfectly legal to export crypto code in printed (book form) and it became increasingly clear that the circuit court would have smacked them around in Zimermmann had it continued
Originally Posted by Doppy
Put your private key on a USB drive and have the drive implanted in your body, with only the plug sticking out. Then you can just plug yourself in as necessary, and if you lose the laptop, your files will still be secure. 

M8

