Feeds

Cyber Rights Hush up new RIP powers

They can't read your emails, even if they want to. Sort of

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Cyber Rights.net has "formed an alliance" with Hush Communications to beat new RIP powers by offering super-encrypted email off its site.

It's so darn secure that when your boss decides he wants to snoop and read all your personal and work emails, he'll end up red-faced and frustrated.

That's amazing you say. Well, yes, but then there a small problem - both the sender and recipient have to use Hushmail accounts. If you go get yourself a Hushmail account and then send an email to a regular account, it'll be just as open as a normal email. Of course, it would still be a very useful anonymiser, but then that's not exactly hard to do anyway.

However, presuming you both do have Hushmail accounts, the security is indeed rather good. By offering 1,024-bit encryption (basically double credit card protection) it seems a little unlikely that anyone but the intended would be able to read it. A random code is generated by moving a mouse over an online black box and some fancy javascript and applets do the rest.

Your password is a phrase which can be as long as you like, although the box displays about 70-odd characters at a time. And there you go.

We spoke to company spokeswoman Genevieve Van Cleve about the closed loop system. Unsurprisingly, she felt it the fact that both people needed Hushmail accounts wasn't a problem, but did say that if people really must use other email systems, Hushmail offers a (less-secure) digital signature for outgoing emails. Hushmail makes its money by selling email services and premium email products.

The RIP powers which came into effect on 24 October allow employers to monitor employees' email and phone conversations. Needless to say, this hasn't been a very popular measure with civil rights groups and trade unions. It may also fall foul of the new Human Rights Act. On top of this the Data Protection Registrar got into hot water when she produced a set of guidelines which appeared to contradict the government line. This topic will not disappear quickly. ®

Related Links

Hush Mail
Cyber Rights.net

Related Stories

Bosses join email snooping scrum
Employee email monitoring saga continues
Bosses gain email snooping rights

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.