Encrypted Communication

Encrypted Communication (2)

Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way not susceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what was said.

OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. Starting with the fundamental premise that complexity is the enemy of security, OpenVPN offers a cost-effective, lightweight alternative to other VPN technologies that is well-targeted for the SME and enterprise markets.

Sunday, 16 August 2015 11:15 Written by in Encrypted Communication

Hushmail can protect you against a variety of security hazards
Protect yourself
Hushmail can protect you against eavesdropping, government surveillance, unauthorized content analysis, identity theft and email forgery. But using Hushmail does not put you above the law. After reading the information below, please take the time to read our policy on illegal activity.
Eavesdropping on your Internet connection
When you are using Hushmail, the connection between your computer and the Hushmail server is protected by encryption. That means that if someone is eavesdropping on your Internet connection, they will not be able to read the traffic that you send to the Hushmail website. This is especially important if you are using your computer on a public or office network, or if you are using a wireless connection that is not encrypted.
Government surveillance programs
In some countries, government sponsored projects have been set up to collect massive amounts of data from the Internet, including emails, and store them away for future analysis. This data collection is done without any search warrant, court order, or subpoena. Hushmail uses HTTPS to help protect your email from that kind of broad government surveillance.
Unauthorized content analysis
When a Hushmail user sends email to another Hushmail user, the body and attachments of the email remain encrypted when they are stored on the hard drives of the Hushmail servers. That means that Hushmail won’t scan your email to collect information for advertising or other purposes.
Data theft
Hushmail can help protect your sensitive data from hackers and identity thieves who try to break into servers and steal large amounts of user data that they can mine for useful information. No system in the world is 100% “unhackable” and anyone who tells you otherwise is being disingenuous. However, some systems are harder to hack than others. In most email systems, once a hacker gains access to the server upon which your email is stored, the email can quickly be copied off the server and read. Hushmail encrypted emails are not so easy to capture, because your passphrase is needed for decryption. The hacker would have to gain control over the software of our system, alter it, and remain undetected until the next time you come back, in hopes of stealing your passphrase the next time that you enter it. That would be a much more difficult task than simply getting in, copying data, and leaving.
Email forgery
Spammers often send emails that look like they come from someone else. If you get an email that looks like it comes from an address of someone you know, there is no guarantee that it actually does. When you send email using Hushmail, you can “digitally sign” the email. That digital signature proves that the email actually came from the true owner of the email account.
FREE – 25 MB storage, no third-party advertising. You’re welcome to evaluate Hushmail for as long as you need to, but you must sign in at least once every three weeks

Friday, 26 June 2015 12:26 Written by in Encrypted Communication

Warranty Disclaimer

Warranty Disclaimer: The FBI, InfraGard, and its affiliates provide information, including but not limited to software, documentation, training, and other guidance to be known as “materials”. The materials are provided as-is and we expressly disclaim any and all warranties, express or implied, including, and without limitation, the implied warranties of merchantability, fitness for a particular purpose, non-infringement, quiet enjoyment, and integration, and warranties arising out of course of dealing or usage of trade. You agree that, as between you and the FBI, InfraGard, and its affiliates, you are responsible for the outcome of the use of materials made available, including but not limited to adherence to licensing requirements, and taking legal and regulatory considerations into account. There is no guarantee of accuracy, completeness, timeliness, or correct sequencing of the information provided.