Category Archives: Reseller Web Hosting

How to set up end-to-end email encryption using Thunderbird

In today’s world, privacy is a major concern. You can’t go anywhere online without seeing “security this” and “hacker that.” Our world has become corrupt with unwarranted spying and data collection in one of the last free-speech areas there is – the Internet. We can’t stop targeted attacks, but we can stop mass surveillance, by building proven security into the everyday Internet. This blog article intends to show you just one way how to take your privacy back. Below, we will show you just how easy it can be, by providing instructions and details on how to set up a fully secured, end-to-end email encryption solution.

Prince Charles Visits GCHQ In Scarborough

Image from Getty Images via Christopher Furlong – The Enigma Machine, arguably one of the most famous encryption mechanisms ever created (and defeated).

 

Setting up Email Encryption with Thunderbird, Gpg4win and Enigmail

Email has one major security flaw, which is that by default, when email is relayed (going from point A to point B) across the internet, it is almost always transmitted from server to server in an unencrypted format; it is also stored in “plain text” on those mail servers. Even if you use SSL to connect to your email server, the chances are, that your email server does not use SSL encryption to transmit your email to the recipient’s email server. This means that the content inside of your emails can be easily “sniffed” (read by an unintended third party) during transit from point A to point B. Also, when the emails are stored in a mail server’s queue, they are stored unencrypted. The mail queue is where your emails sit, while they are waiting to be delivered. They do not get delivered to you until you decide to log in and check for new emails. Since they are stored in plain text, any unintended 3rd party can read your emails. This could be a government official or a server administrator at your email hosting provider.  That’s kind of scary, right?

This is where end-to-end email encryption comes into play.

End-to-end email encryption will keep email text and attachments out of prying hands. To use it, first, you will need a mail program.

Continue reading

Secure Sockets Layer (SSL) and You

Do you ever see that little lock symbol in the address bar of your browser and wonder exactly what it’s doing? How does this “SSL” protect your data? I’m going to tell you a little story that will help understanding Secure Sockets Layer encryption a little easier.

Let’s say you have something you want to send the server over the internet that you don’t want prying eyes to have – a credit card number for example. If you just send it in plain text, anyone sitting out there with a packet sniffer monitoring traffic can find it, read it, and buy that new 50” LED TV they’ve been wanting… compliments of you! That’s where SSL comes in to play.

SSL requires a few things to work. First – there’s the box. This box will serve as the vessesslkeysl to transport your secure data back and forth. But sending stuff in a box won’t make any difference if it’s not locked! To fix that, both the server and yourself generate two keys that can either unlock or lock the box: a private key and a public key. In order to get the ball rolling, you and the server trade public keys. The trick here? The public key is only used to lock the box, so we aren’t concerned with the bad guys getting it. The only way to unlock the box is with our private keys, which never touch the network.

Continue reading