Jump to content


Photo

Encrypted Email Opinion

Encrypted email opinion

  • Please log in to reply
7 replies to this topic

#1 S.O.A.

S.O.A.

    Advanced Member

  • Members
  • PipPipPip
  • 262 posts

Posted 13 July 2017 - 06:39 PM

Hello all,

I would like your opinion on a question a friend of mine asked the other day about encrypted email. I personally use an encrypted email provider as my main email contact.

The question was, why use an encrypted email service when most people do not, and your emails, therefore are not encrypted and are logged and stored on the recipients email service anyway?

As I would assume most of us here care about our privacy, I thought I would gather some of your opinions.

#2 Embers

Embers

    Advanced Member

  • Members
  • PipPipPip
  • 39 posts

Posted 13 July 2017 - 07:23 PM

There are many reasons I suppose, for me personally on the very very low chance someone got access to my e-mail, they couldn't read it(I use pgp and decrypt locally) so they can't get anything of mine.



#3 zhang888

zhang888

    Donald Trump of IT/Security

  • Moderators
  • 2225 posts

Posted 13 July 2017 - 11:04 PM

Define encrypted email.
An encrypted email [conversation] can be only considered as such when both parties
use PGP or any other type of end-to-end encryption.
All those services that advertise an encrypted email [box] as a single user solution simply
misguide their users to get potential customers.
When your senders/receivers use the classic email protocols, the email provider can
still read all your incoming and outgoing mails.
A few exceptions are services like Protonmail assuming again that both parties use the
built-in PGP keys between them, where there is a possibility that they don't store it on
their servers when the session ends, something nobody can assure except the provider.

Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.


#4 XN8839793

XN8839793

    Newbie

  • Members
  • Pip
  • 7 posts

Posted 17 July 2017 - 12:02 AM

​ProtonMail has been very secure for me no issues so far. :good:



#5 SDBF

SDBF

    Advanced Member

  • Members
  • PipPipPip
  • 34 posts

Posted 20 July 2017 - 09:29 PM

PGP for being totally secure, but I use Tutanota for  most of my less sensitive encrypted communications.   You can send an encrypted email to another without them being on Tutanota, just with a password(Proton has the same thing, and with them you can set it to self destruct. Tutanota will be adding self destruct soon). Both of these services are tolerable, especially when sending between people with both on the same email service.  Something like Riseup, while I appreciate them and use them too, I do not trust it to keep anything I send thru it secure. Mostly because they've been visited and had servers confiscated and didn't update their warrant canary for quite awhile. Now they've said they have instituted more secure protocols, that included end to end(my problem though is it was to supposed to be end to end before this)encryption but I keep having the thought pop up in my mind that some or all of these changes are window dressing for the back doors that were forced upon them to install. I have no proof but with all of the revelations since 2013, it's not hard to see that happening. 

 

If you want security, learn to use PGP.  This one for me is the easiest:  https://www.gpg4usb.org/download.html



#6 Keksjdjdke

Keksjdjdke

    Advanced Member

  • Members
  • PipPipPip
  • 207 posts

Posted 20 July 2017 - 10:59 PM

Protonmail great service they have a great iOS mobile app, and they have a tor Hidden service. https://protonmail.com/tor

If you use their mobile app to create your account you can use a 4,096 bit pgp key



#7 cm0s

cm0s

    Advanced Member

  • Members
  • PipPipPip
  • 301 posts

Posted 20 July 2017 - 11:04 PM

make a directory...
	
# mkdir ~/emailstuff
# cd emailstuff

make a file...

# touch email2bob.md
# nano email2bob.md

write your email to bob then... 

# ctrl+o, ctrl+x, enter

backup out of the directory 
then compress it...

# cd ..
# tar -zcvf emailstuff.tar.gz emailstuff

gen yer sha...

# sha256sum emailstuff.tar.gz

copy sha numbers then sign the email...

# gpg --armor --detach-sign emailstuff.tar.gz

now to encrypt the email then
give that password and sha numbers to bob...

# gpg -o emailstuff.tar.gz.gpg --symmetric --cipher-algo aes256 emailstuff.tar.gz

bob now decrypts your email and enters the password...

# gpg -o emailstuff.tar.gz -d emailstuff.tar.gz.gpg

bob imports your public key...

# gpg --import yourkey.asc

then checks if signature good...

# gpg --verify emailstuff.tar.gz.asc emailstuff.tar.gz

bob might get a 'warning not verified' 
important part is 'good signature'

bob verifies the sha
make sure the numbers match...

# sha256sum emailstuff.tar.gz

bob then uncompresses the email...

# tar -zxvf emailstuff.tar.gz


#8 giganerd

giganerd

    I shall have no title

  • Members2
  • PipPipPip
  • 2687 posts
  • LocationGermany

Posted 26 July 2017 - 08:11 AM

People ask me a similar question when I say I mainly use Linux. Why use Linux if everyone else is using Windows?

Anyway, I share the opinion of Mrs. Embers. In case a scriptkiddie manages to intercept a mail my client pulls from Posteo's inbox he's going to have a difficult time reading what it's all about. :)

Sent via Tapatalk. Means, I don't have a computer available now.

Always remember:
There's a guide to AirVPN,

Amazon IPs are not dangerous here,
running TOR exits is discouraged,

using spoilers for your logs helps us read your thread.

~ Furthermore, I propose that your paranoia is to be destroyed. ~

Instead of writing me a personal mail, consider contacting me via XMPP at gigan3rd@xmpp.airvpn.org or join the lounge@conference.xmpp.airvpn.org. I might read the mail too late whereas I'm always available on XMPP ;)






Also tagged with one or more of these keywords: Encrypted, email, opinion

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Servers online. Online Sessions: 14925 - BW: 57592 Mbit/sYour IP: 34.228.55.57Guest Access.