Google Answers Logo
View Question
 
Q: e-mail security ( Answered 3 out of 5 stars,   3 Comments )
Question  
Subject: e-mail security
Category: Computers > Security
Asked by: raofsiam-ga
List Price: $5.00
Posted: 04 Jan 2003 09:50 PST
Expires: 03 Feb 2003 09:50 PST
Question ID: 137408
Can a determined hacker use the internet to read my e-mails?  If so,
would it be necessary that he have special access to my service
provider or other identifiable access portal?
Answer  
Subject: Re: e-mail security
Answered By: answerguru-ga on 04 Jan 2003 11:20 PST
Rated:3 out of 5 stars
 
Hi raofsiam-ga,

The short answer to your question is "maybe" - the criterion that
determines whether or not it is possible to access another individuals
email messages is if encryption is being used.

"Most people do not know that e-mail messages are archived, and that
any hacker with a modicum of expertise can read e-mail sent months, or
even years, earlier. In fact, most people believe that e-mail is
generally secure."

"There are plenty of e-mail encryption  services available, some of
them free. Yet most people don't seem to want to go to the trouble of
using them."

http://www.newsfactor.com/perl/story/18860.html

Here are some of the more popular encryption services available:

1on1mail - Fully configurable client and server software, can operate
behind firewalls, complete confidentiality and more.


Absolute Future - Specialist in designing and developing web-based
software, particularly in the areas of security and encryption,
databases and Internet communications.

ControlMail - Documents are naturally encrypted using techniques that
can be set with security rights including passwords, read only,
printing disabled and file expiry date.

Disappearing Inc. - Developer of email policy management systems and
services that allow companies to minimize the risks associated with
email.

Global Network Security Consultants, LLC: Email Encryption - Provider
of information security tools and threat management solutions,
including encryption products for email.

HushMail - Provider of free, encrypted, web-based email services. 

HyperSend - Provider of trackable email delivery by relying on the
secure data transfer protocols used by web browsers.

John Doe Anonymity System - Encryption technologies that facilitate
the use of anonymous mailers.

Mailsafe - Offers secure, enhanced email services and software. 

PostX - Provides solutions that enable businesses to securely deliver
high-volume, high-value information to customers via email and the
Web.

QVtech, Inc. - Developer of Java-based e-mail security and policy
management software called Interosa(tm). Features include automatic
expiration of messages, decryption prevention, password protection and
encryption.

SafeMessage - Provides privacy by preventing the duplication of its
encrypted messages and allowing the sender to set the message
autoshred date, leaving no permanent record.

SecureNym - Provides a private, anonymous email service to the
internet community.

Sigaba - Secure email solution for individual users and corporations.

TSPMail - Services provided encompass data confidentiality, data
integrity, user authentication and domain-based access restriction for
all email messages leaving and entering users' desktops.

ZipLip.com - Offers file transfers that contains secure messaging and
collaboration services.

ZixIt/ZixMail.com, Inc. - Provider of secure e-mail services that
allow user to send and recieve digitally encrypted messages using
existing e-mail addresses and programs. Services are provided to
multiple industries. This company was capitalized by corporate
investmen ...

http://www.business.com/directory/internet_and_online/email/encryption/

There is also a useful set of tools recommended by the Electronic
Privacy Information Center:

http://www.epic.org/privacy/tools.html

I wanted to also note that all of the tools listed above encrypt the
message itself, so that the message is safe regardless of where it is
being access from (usually this would be from the archived emails of
you ISP or on your own system).

If you have any problems understanding the information above please
feel free to post a clarification and I will respond in a timely
manner :)

Cheers!

answerguru-ga
Google Answers Researcher
raofsiam-ga rated this answer:3 out of 5 stars
The answer supplied useful information but did not address the
specific question.  For example, e-mails are archived: on my computer
and where else? And what is the significance of the archives located
elsewhere?  The comments helped to round out the answer.

Comments  
Subject: Re: e-mail security
From: stuartwoozle-ga on 04 Jan 2003 11:29 PST
 
It's also worth noting that, if you're using popular email software
such as Outlook or Outlook Express, you can apply for a free 'digital
certificate' from a company called Thawte. You don't need much
technical experience to get this working - but basically this
integrates seamlessly into the email program to allow you to send
encrypted email to people simply by clicking an "encrypt" button in
the software.

For more information, take a look at:
http://www.thawte.com/html/COMMUNITY/personal/index.html

Best wishes,
stuartwoozle-ga
Subject: Re: e-mail security
From: lot-ga on 04 Jan 2003 14:05 PST
 
Hello,
If a hacker monitors your connection from your PC (using your IP
address), they can intercept a plain text email when it gets
transmitted to your ISP. I don't believe they need any special access,
they just probe your ports, if you don't have a firewall/NAT in place,
access to files on your PC is possible). If your ISP provides you with
a dynamic IP that offers a slightly higher level of protection than a
fixed IP since your PC will always reside at that number and is more
'open' to repeat attacks.
regards lot-ga
Subject: Re: e-mail security
From: kwokfai-ga on 08 Jan 2003 01:39 PST
 
Further to lot's comment, if you want to eliminate or a least reduce
the risk of your data travelling between your PC to internet(to your
email server either at ISP or office) being tapped, you can setup a
secure tunnel.  For a paid services, go to
http://www.onlineprivacystore.com/products/secure_tunneling/index.shtml
which provide this service.  However, you still have to make sure no
key logging software to be installed in your computer.

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy