Feeds

Still sending naked email? Get your protection here

Buckle your seatbelt, encrypt your bits

  • alert
  • submit to reddit

Intelligent flash storage arrays

Epilogue

With your new-found ability to send and receive encrypted email, you'll want to get in the habit of practicing sound crypto hygiene that goes beyond the scope of this article. The Gpg4Win folks offer their own how-to here, and the GNU Privacy Handbook also provides useful information. The Enigmail creators also have helpful information here.

But we'd be remiss if we didn't offer this one non-negotiable rule: Trust only public keys that you have verified in advance with the sender. One common verification practice is to speak with the other person by phone or in person and compare the key's fingerprint, which the GPA keyring editor displays when a key is highlighted. Once you're satisfied the key is legit, you should sign it. To do that, right click on it in the GPA keyring editor, choose Set Owner Trust, choose the Full radio button and click OK.

In a world of repressive governments and a growing reliance on insecure networks, there's no way anyone can be sure their most sensitive messages aren't intercepted by the forces of darkness. But you can make it mathematically improbable that all but the most well-funded snoops could ever make heads or tales of your communications. Of course, only you can make that happen. The ball is in your court. ®

Internet Security Threat Report 2014

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.