ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
View Torrent Info: Fantastic Beast and Where To Find Them 2016 HD-TS x264-CPG
View Torrent Info: Arrival 2016 HDCAM x264 AC3-TuttyFruity
Hot torrents
XVID DIVX
View Torrent Info: End.of.a.Gun.2016.BRRip.XviD.AC3-EVO
View Torrent Info: Sully.2016.BRRip.XviD.AC3-ETRG
View Torrent Info: Storks.2016.BRRip.XviD.AC3-EVO
View Torrent Info: The.Accountant.2016.HC.HDRip.X264.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Sully.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Storks.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Eliminators.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Morgan.2016.720p.BRRip.x264.AAC-ETRG
Hot torrents
Television
View Torrent Info: Bellator 166 Dantas vs Warren 2 HDTV x264-Ebi [TJET]
View Torrent Info: Ghost.Adventures.S13E10.Dumas.Brothel.HDTV.x264-SPASM
View Torrent Info: Van.Helsing.S01E12.WEB-DL.x264-FUM[ettv]
View Torrent Info: Z.Nation.S03E12.WEB-DL.x264-FUM[ettv]
View Torrent Info: Morgan (2016) 1080p BDRip DUAL DD 5.1 x264 ~ PyZ
View Torrent Info: Kahaani 2 (2016) Hindi 1CD Desi Cam x264 AAC - Downloadhub
View Torrent Info: Air Bud (1997) 720p HDTVRip x264 Eng Subs [Dual Audio] [Hindi 2.0 - English 5.1] -=!Dr.STAR!=-
View Torrent Info: Ardaas (2016) DVDRIP 1CDRIP x264 AAC ESub [DDR]
30s
Chat
To add new messages please Login or Register for FREE
Warning! Use a VPN When Downloading Torrents!
Your IP Address is 54.197.133.54.   Location is United States
Your Internet Provider and Government can track your torrent activity!  Hide your IP ADDRESS with a VPN!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > A Few Ways to Secure Your E-Mail

A Few Ways to Secure Your E-Mail

A Few Ways to Secure Your E-Mail

Added: Sunday, May 26th, 2013
Category: About Torrents > Staying Safe And Secure
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.com, 2013
It recently became known that in some cases the government may read your private e-mails, which can’t be good news for any citizen. This is why security experts of different sources and Electronic Frontier Foundation introduce a few ways to counter the government’s surveillance techniques.
Personal+Computer+Security.png

The EFF has created a Surveillance Self-Defense website in order to educate the US citizens about the law and technology of government surveillance in the country. First of all, you should know how your e-mail service works: the information is transferred between the sender and the receiver “through the wire”, i.e., through other nodes/servers, and this is where the government can get it.

1. End-to-end encryption

You can use such software as PGP (aka Pretty Good Privacy) and the GNU Privacy Guard (GnuPG) to protect your transiting e-mails. They will also secure stored information. When you use end-to-end encryption, you ensure the privacy not just of your e-mails through the wire, but also of the e-mails stored on your PC or other machines. Don’t forget that these programs work only if the receiver has them installed as well, and you need to find and verify the receiver’s public keys.
2. Server-to-server encrypted transit

When you send an e-mail, its content usually passes through a chain of SMTP mail servers. You can check e-mail’s headers to find out which servers it passed through. Although most free e-mail providers don’t encrypt your messages when they pass the SMTP servers, you still can secure your e-mail’s content when it transits those servers through TLS (Transport Layer Security). Just make sure your e-mail provider supports this kind of encryption.
3. Client-to-mail server encryption

If you use webmail services, check whether your e-mail provider uses the HTTPS protocol. Hushmail.com, for example, always uses HTTPS, and also provides end-to-end encryption. Then, even if webmail services use HTTPS to their login page, they may switch back to HTTP after this step. In this case you need to look for a configuration option or a browser plugin which would keep the secure protocol enabled at all times. Gmail, for instance, always enables the HTTPS security protocol.
4. Information stored on other PCs

Unless you have your own private mail server, other machine gets your e-mails. Your ISP or a webmail provider’s sent texts are traceable and therefore can be accessed by third parties. Make sure to delete messages from your ISP mail server after download or delete them after you finished reading them. However, this can’t guarantee 100% that the mail is forever gone. In this case, the best way is to use PGP/GnuPG encrypted e-mails.


By:
SaM
May 26th,2013

Posted by: 
SaM

Date:  Sunday, May 26th, 2013



Comments (12) (please add your comment »)

1
posted by (2013-05-26 21:54:32)
bubfred72 avatarThx, for the info Sam, but will that really help against government agencies?

2
posted by (2013-05-26 23:06:55)
No avatarThey store all of our text messages, what will be so different than email. You can use all t he encryption you want, but if they really want your emails, they will still get them. Damn shame no more privacy for the common folks.

3
posted by (2013-05-27 01:47:34)
Mr_3D avatarSuperb info..thanks keep it up.

4
posted by Site FriendET loverSuperman (2013-05-27 03:00:34)
Embolism avatarPidgin along with pidgin encryption plugin is simple to use and free to download 'sourceforge.net or google it here is another usefull toolkit for those who are less than clever in their anonymity : sourceforge.net/projects/anononthego/?source=directory -fortune favours the prepared mind

5
posted by Site FriendET loverSuperman (2013-05-27 03:13:18)
Embolism avatar@1 If you are really looking to go one step further than encryption of your mail i.e passing state secrets and both parties are using Linux, quite easily you can open a secure tunnel but other than that the above applications in anononthego from sourceforge are all you really need,a word of caution though when using secure applications like Tor do not use 3rd party plugins like adobe flash as you defeat the security of the application,bon chance.

6
posted by Site FriendET loverSuperman (2013-05-27 03:27:21)
Embolism avatarThis link should help a little as well for those using utorrent and has some [email protected] `s that are of interest: schoolofprivacy.eu/ As always good information SaM,thanks (:^D)

7
posted by Blocked (2013-05-27 09:44:18)
No avatarThanxx sam

8
posted by men (2013-05-27 14:56:19)
butt7722 avatartnx sam well information

9
posted by (2013-05-28 06:05:22)
zippofreak13 avatarThanks SaM

10
posted by (2013-05-29 18:29:26)
No avatarThanks for the info. How do you like the Democrats and this Regime invading your privacy?

11
posted by Site FriendET loverSuperman (2013-05-30 15:40:05)
Embolism avatarMy sister is American but I am English,personally see any invasion of privacy the same as having a hacker in my box and do not suffer it gladly,my personal views on Obama are that he and his predecessor are both nodniks and having a security force outside of the military independent of the police and having military grade weapons is exactly what Adolph Hitler had with the SS although Homeland Security is no doubt a required evil it does lend much to the establishment of an Orwellian state along with blanket wire-tapping of civilians and the associated press as well as perpetuation of Guantanamo Bay where guilty or innocent it matters not since you have no rights to a lawyer,trial or any human rights whatsoever,Obama being given the Nobel peace prize for rescinding his white paper on waterboarding made me laugh my socks off since it was his very order that allowed it in the first instance,humanitarian my Ass.

12
posted by Site FriendET loverSuperman (2013-05-30 15:44:36)
Embolism avatarKnown as the Foreign Intelligence Surveillance Act, the law allows the government to monitor overseas phone calls and emails without obtaining a court order for each intercept.It must also be noted that with Obamas backing of the latest FBI idea of wire-tapping without a warrant many will have their data monitored and collected in the latest facility for such in Colorado as well as any information digitally obtained from their ISP`s.



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc3