why Silent Circle couldn’t just use an asymmetric key cryptography plug-in for email applications to secure communications between its users

Silent Circle company was operating  Silent Mail encrypted-email service.

why it couldn’t just use an asymmetric key cryptography plug-in for email applications to secure communications between its users

In short, it’s all about the metadata.

“If the goal is simply to encrypt the body of the message there are services and products that accomplish

“If your goal is to not have metadata leakage in your otherwise secure communications, you may wish to avoid email altogether. Email leaks the information about who is communicating, and how often. This information may be just as damaging as the content of the email.”

“With the tapping of backbone internet providers, interested parties can now see all traffic on the internet. The days where it was possible for two people to have a truly private conversation over email, if they ever existed, are long over.”

a freedom fighter working on an oppressive country” would be just as concerned about the metadata

“In the past, securing the body of the message was sufficient. The tools and techniques used for snooping were not on a large enough scale to allow the metadata to be useful,”

“With the tapping of backbone internet providers, interested parties can now see all traffic on the internet. The days where it was possible for two people to have a truly private conversation over email, if they ever existed, are long over.”

email may remain a suitable form of communication for people and companies who care more about encrypting the body of their messages than the metadata around it

the metadata is what the spooks want for the simple reason that it’s machine-readable and therefore searchable. It’s what makes comprehensive internet-scale surveillance possible.”

source:  http://www.businessinsider.com/encryption-expert-the-days-of-a-truly-private-email-conversations-are-long-over-2013-8#ixzz2eUPmvsOH

Advertisements
Explore posts in the same categories: techs

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: