Tuesday, May 09, 2006

Is Your Email Private? Part 1 Of 3

By: Mike Ameye

In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Every birthday greeting or Dear John email, every complaint, rant or verbal purge we may have sent to our employers, credit companies, congressman or customer service rep is subject to delivery errors or outright interception.

How can this be? To answer that we need to understand how email works. For the vast majority of email users today, the email system they use consists of two servers providing incoming and outgoing services, SMTP and POP3.

The SMTP (Simple Mail Transfer Protocol) server handles the outgoing email. SMTP was designed years ago when plain ascii text was all there was to send via email. So, when you push the "Send" button in your email client, the SMTP server at your ISP (Internet Service Provider) connects with the incoming POP3 (Post Office Protocol ver. 3) server where you are sending the email. The servers have a short "chat" verifying that the email address you are trying to send to exists on the incoming POP3 server. Then the SMTP server passes the message to the POP3 server and the POP3 server puts the message into the recipient's email box. At no time during the process is your email encrypted to protect your privacy. The message could be intercepted at anytime during the process and read by anyone.

On occasion, email sent to you or by you may even be delivered to the wrong inbox and your private message is no longer private. A single misdirected message could expose you to all kinds of trouble depending upon it's content.

Well, no one wants to read your email right? Wrong! Have you ever heard of Carnivore? That's a system that the FBI uses to harvest all email traffic going through a network. How does this affect you? When the FBI hooks Carnivore up to your ISP's network because they suspect someone of dealing drugs or some other crime, Carnivore will filter through ALL email looking for keywords that relate to the crime in question. And because the search has to be intentionally vague, you may be sending a request for information about a prescription drug you take and Carnivore will harvest your email to be read by a human agent. Suddenly, the drugs you're taking are now public knowledge. Spammers have also been known to harvest email addresses via captured emails.

OK - so now that you know the problem, what should you do about securing your privacy? It was hinted at earlier on... encryption! Learn how to use PGP (Pretty Good Privacy) to encrypt your email.

PGP uses a Public/Private key method to encrypt email. First you create a "Public" key. This is the key that others will use to encrypt email sent to you. Send this key to everyone you want to receive encrypted email from. Then you create a "Private" key. This is the key you use to decrypt any encrypted email sent to you. Safeguard this key well. It is the only thing that can decrypt your messages. If you tell someone what it is or loose it, your privacy is again compromised.

For more information on PGP and a free download visit: http://www.pgpi.org. Next Time: Incorporating PGP into your email...


About the Author:

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work or to sign up for PSS Online - a privacy, safety, and security ezine.




































































































nitoring software mnitoring software moitoring software montoring software monioring software monitring software monitoing software monitorng software monitorig software monitorin software monitoring oftware monitoring sftware monitoring sotware monitoring sofware monitoring softare monitoring softwre monitoring softwae monitoring softwar mmonitoring software moonitoring software monnitoring software moniitoring software monittoring software monitooring software monitorring software monitoriing software monitorinng software monitoringg software monitoring ssoftware monitoring sooftware monitoring sofftware monitoring softtware monitoring softwware monitoring softwaare monitoring softwarre monitoring softwaree omnitoring software mnoitoring software mointoring software montioring software moniotring software monitroing software monitoirng software monitornig software monitorign software monitorin gsoftware monitoring osftware monitoring sfotware monitoring sotfware monitoring sofwtare monitoring softawre monitoring softwrae monitoring softwaer monitoringsoftware nonitoring software jonitoring software konitoring software minitoring software m9nitoring software m0nitoring software mpnitoring software mlnitoring software mknitoring software mobitoring software mohitoring software mojitoring software momitoring software monutoring software mon8toring software mon9toring software monotoring software monltoring software monktoring software monjtoring software moniroring software moni5oring software moni6oring software moniyoring software monihoring software monigoring software moniforing software monitiring software monit9ring software monit0ring software monitpring software monitlring software monitkring software monitoeing software monito4ing software monito5ing software monitoting software monitoging software monitofing software monitoding software monitorung software monitor8ng software monitor9ng software monitorong software monitorlng software monitorkng software monitorjng software monitoribg software monitorihg software monitorijg software monitorimg software monitorinf software monitorint software monitoriny software monitorinh software monitorinb software monitorinv software monitoring aoftware monitoring woftware monitoring eoftware monitoring doftware monitoring xoftware monitoring zoftware monitoring siftware monitoring s9ftware monitoring s0ftware monitoring spftware monitoring slftware monitoring skftware monitoring sodtware monitoring sortware monitoring sottware monitoring sogtware monitoring sovtware monitoring soctware monitoring sofrware monitoring sof5ware monitoring sof6ware monitoring sofyware monitoring sofhware monitoring sofgware monitoring soffware monitoring softqare monitoring soft2are monitoring soft3are monitoring softeare monitoring softdare monitoring softsare monitoring softaare monitoring softwqre monitoring softwwre monitoring softwsre monitoring softwxre monitoring softwzre monitoring softwaee monitoring softwa4e monitoring softwa5e monitoring softwate monitoring softwage monitoring softwafe monitoring softwade monitoring softwarw monitoring softwar3 monitoring softwar4 monitoring softwarr monitoring softwarf monitoring softward monitoring softwars