This Website Contains Information On IT Security Inclusive Are Standards/Policies/Procedures/Advisories/Exploits/Vulns/Countermeasures/
reverse engineering/Privacy Etc., , Risk Analysis & Governance Spanning Multiple Industries, And Finally Research Papers Written By Myself or others On A Multitude Of Subjects.. Enter a search and you shall find almost any topic on security.
Thank you for taking the time out to read this site as it is my way of giving back to the IT security community and public at large. Its primary goal is to inform the IT Security community and the general public about IT Security Advisories, Education in This Area and Countermeasures To Protect Critical Data From Being Exploited by Attackers. Remember be proactive as opposed to just being reactive!
Assuming that a person’s email communications are legal and ethical, that person deserves to know that the communications are private. But sometimes others can manage to obtain those communications if the sender has not taken some important precautions.
Use disposable email addresses on both ends of the conversation.
Nashville, Tenn. (PRWEB) December 28, 2012
In a shocking recent story reported by numerous media outlets, CIA Director David Petraeus stepped down from his position after an FBI investigation revealed his extramarital affair with Paula Broadwell, his biographer. The information leading to the revelation was actually obtained indirectly by using location data from Gmail.
The original red flag, according to USA Today and other media, was a series of anonymous threatening emails to a Florida woman who organized military social events. When the emails were traced to their origin – Broadwell’s IP address – the FBI began monitoring her email addresses and discovered another email account in which Petraeus and Broadwell left drafts of messages for each other in order to avoid an email trail. Both the threatening emails and the draft communications with Petraeus came from Broadwell’s IP address.
Best known for teaching people how to build their own environmentally-friendly sources of energy so that they can slash their power bills and be safe when power outages occur, Power4Patriots also wants to help people keep their legal and ethical emails private.
Following are Power4Patriots’ 3 ways to make emails untraceable:
1. Hide the IP address. A VPN (Virtual Private Network) service such as Hamachi will work on its own, assuming it does not give up the IP address to someone asking for it, but additional security is web proxy Privoxy. It’s important to use the VPN every time people log into their email for this to work.
2. Use disposable email addresses on both ends of the conversation. These addresses self-destruct after an email is read.
3. Use different email providers to send email messages that should not be linked.
To be on the safe side, keep all private information offline. If privacy is crucial, don’t include the information in an email. Text messages may be better, but sometimes they’re not as private as one would like to think, either.