What is the most secure form of online communication?

cuetip

Emails are considered fair game by law enforcement, and after 6 months the current practice is to read/seize any that are wanted without a warrant. I think this is pretty terrible. Why do I have suddenly no right to privacy when my emails are concerned after 180 days have passed? I don’t buy the argument that if you don’t have anything to hide, you shouldn’t be worried. How can you communicate online in a secure way, without wondering if some guy who hated you back in high school is now a cop reading all of your "private" messages?

Topic: Security
Answer this Question

Answers

4 total
george70633
Vote Up (18)

The only way of secure online communication is by using the Cackle.it communication platform which will be launched in September 2013 that provides secure, safe, private and confidential voice, chat, email and browsing experience using the most advanced end to end encryption technology where by no one will intercept your comunication until it reaches the intended reciepient.

jimlynch
Vote Up (17)

This page has quite a bit of info on how to opt out of the NSA's Prism spying program, including a list of email encryption programs:

http://prism-break.org

Christopher Nerney
Vote Up (17)

I think your question is best answered by the digital security professionals monitoring your online activities and this website. How about it, folks? Any tips for us?

nchristine
Vote Up (17)

You need to have end-to-end encryption on your communications, and no record of the conversation. Oh, and use Tor. Google, Microsoft and Apple all have products that should be fairly secure, such as Skype and Facetime, but nothing is totally secure (see this Slate article), and the headaches of taking many additional steps aren’t likely to appeal to most people. 

Ask a question

Join Now or Sign In to ask a question.
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.
Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe when you travel.
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.
A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.
Questions abound over sites authenticating users via identities established through social networks, Yahoo Ponemon Institute survey shows.