What is the most secure form of online communication?

cuetip

Emails are considered fair game by law enforcement, and after 6 months the current practice is to read/seize any that are wanted without a warrant. I think this is pretty terrible. Why do I have suddenly no right to privacy when my emails are concerned after 180 days have passed? I don’t buy the argument that if you don’t have anything to hide, you shouldn’t be worried. How can you communicate online in a secure way, without wondering if some guy who hated you back in high school is now a cop reading all of your "private" messages?

Topic: Security
Answer this Question

Answers

4 total
jimlynch
Vote Up (14)

This page has quite a bit of info on how to opt out of the NSA's Prism spying program, including a list of email encryption programs:

http://prism-break.org

george70633
Vote Up (12)

The only way of secure online communication is by using the Cackle.it communication platform which will be launched in September 2013 that provides secure, safe, private and confidential voice, chat, email and browsing experience using the most advanced end to end encryption technology where by no one will intercept your comunication until it reaches the intended reciepient.

Christopher Nerney
Vote Up (12)

I think your question is best answered by the digital security professionals monitoring your online activities and this website. How about it, folks? Any tips for us?

nchristine
Vote Up (12)

You need to have end-to-end encryption on your communications, and no record of the conversation. Oh, and use Tor. Google, Microsoft and Apple all have products that should be fairly secure, such as Skype and Facetime, but nothing is totally secure (see this Slate article), and the headaches of taking many additional steps aren’t likely to appeal to most people. 

Ask a question

Join Now or Sign In to ask a question.
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.
Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.
Whether it's the first time you've picked up an iPad or the seventeenth time you've pulled out your iPhone today, there are probably still some iOS 7 features and functionality that you're not familiar with. Don't sweat it: We're here to help. We've collected some of our favorite and most useful tips and compiled them here, just for you.
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity.
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.
Microsoft may have retired Windows XP, but one of China's leading security vendors is trying to keep the OS threat-free, and rolling out protection software to hundreds of millions of users in the nation.
For almost an entire year, malicious attackers may have been harvesting customer information including credit card data.
During a week in which everyone seemed to be searching for answers amid revelations of the Heartbleed bug, several universities and their partners announced new efforts to explore IT security advances.
The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness