Introduction
We all have a need for private communication. Whether it’s details of our preparations that we want to share with others in a group, discussing tactics, carrying on trade, or any of a hundred other matters, we should be concerned about keeping our communication private. We should be especially careful when communicating electronically: it’s little more than trivial for a government, a corporation, or even a couple of well-equipped criminals to intercept phone calls, emails, or text messages. We can use encryption, which transforms data into a form that can only be read with a secret key, to help preserve our privacy.
Providers That Purport To Keep Emails Private
There are plenty of e-mail providers that purport to keep your emails private, e.g. Hushmail, ProtonMail, and SCRYPTmail. There are also encrypted messaging providers, like Signal and Telegram. I don’t trust them, and neither should you. Take Hushmail, for example. They claim to store only encrypted e-mails, which not even their own employees can read. However, they have released decrypted e-mail data to authorities pursuant to a Canadian court order, and their revised terms of service suggest they will continue doing so. The others have similar problems, having servers in troubling jurisdictions or having weak or subpoena-vulnerable storage of encryption keys. You simply can’t know what’s happening to your data once it’s on someone else’s server.
Encryption Failures in the News
Even lately, encryption failures have been in the news. The EFail exploit, based on how many email clients implement PGP encryption, and a similar flaw was discovered in Signal and Telegram, both which reveal the clear text of what you meant to keep secret.
Continue reading“PGP for Preppers- Part 1, by Groundhog Gravy”