Loading...
 

Email Protections

Our written communication has long been a protected medium. From the earliest days of couriers running messages between parties on foot it has been considered forbidden for the messenger to read the content. Today our online messengers have unrestrained access to reading (they call it scanning) every email that passes through their computers. The answer to preventing this activity is simply to stop using the centrallized email repositories invading your communications. This is not difficult to do.


What To Do

Protecting one's self from the invasive eyes of mail hosts varies in complexity depending on your goals and tolerance for risk.
At the simplest level, you need only change to a secure provider.
Recommended Alternative Search
Method Type Description
Hushmail service Simply put, HushMail provides HIPAA compliant email services. The HushMail service offering looks very much like Gmail, Ymail and the others on the surface. It is a company that centrally hosts thousands, maybe millions of email accounts. It is accessed by a browser and it is free of charge. There are however, significant differences. Google scans (i.e. reads) all email content. Hushmail reads no content and encrypts the email they store. "Gossip" is Google's business model. HushMail's business model uses the "Try Before Buy" aspect of the "Direct" business model. The two businesses are completely inverse in that HushMail operates from the perspective applying a business framework within the constraints allowable by good privacy practices. Google, Ymail on the other hand stretch their privacy practices as far as the public will tolerate in support of ambitious business goals. Take a look at HushMail's privacy policy in contrast to Google's defense of their own tactics.
ProtonMail service A newer service based in Switzerland that operates very much on the same principles as Hushmail. The pricing is comparable as well. You could, for the most part, read the "Hushmail" description above and apply it to this site as well.
ISP email service Internet Service Providers (ISP) nearly all provide some sort of email hosting service. While we at TekAdvocates are not aware of an ISP that has been identified as scanning email content for purposes other than virus protection and spam prevention, we are also not aware of an ISP that declares definitively that they do not do so. Use of an ISP provided mail account is better than using an obviously intrusive provider like Gmail, vigilance is however warranted. The major ISPs have shown themselves to not be above invasive behavior.
Personal Server internal Running a personal server within your domain, and especially on your own computer, is the single best way to assure email stored on the server is not being accessed by anyone else. Private servers are the approach taken by the big corporations wanting to protect their own data. You won't find Google hosting their email over on Microsoft's "Hotmail" or "Outlook" mail services, even if it is free. This is however a little technical for many people and a lot of ISP's block the SMTP port (25) from receiving emails at the residential IP addresses of their customers. Ways for addressing these issues are discussed in step 6 of the "Breaking Away" pages of this site.


Special Notes
This page discusses strategies for keeping your email secure at it's point delivery on the mail server. Two other aspects of mail delivery are important to a completely secure solution.

  1. Reading/Sending email, transferring it from the server to your screen or visa versa
  2. Transferring email, passing the email from your email server to the recipient server

Both of these areas differ from the issue of scanning email by the host in that they represent the hazard of interception by an unknown third party that is a problem with any communication. The scanning of emails by the host is a violation of trust by the entity you have specifically chosen to handle your messages.

Aspect 1 can be relatively easy resolved by assuring you are using a secure connection to your mail provider if you are using a browser based solution. If you look in your browser address bar and you see "https:// ..." you are using a secure connection. If you see "http:// ..." you are not using a secure connection. This only protects you from your device to the server. It does not protect your information on the server itself.

Aspect 2 is much more difficult to solve. Email transferred between mail servers is, as of this writing, passed as unencrypted clear-text as the standard on the Internet. Solutions are to pass messages within a private network or use a service that allows for the sending of encrypted messages. The former is discussed in step 6 of the "Breaking Away" section.

Seven steps to using the Internet in privacy as a respected Netizen.
  1. Perspective
  2. Search
  3. Email
  4. Social Security
  5. Have Presence
  6. Take Control
  7. Break The Ties

Shoutbox

Steve: Fautore 0.6.0.0 is now released and available to our registered Alpha participants!
Steve: Fautore 5.3.0 is now released and includes dynamically updated stats reporting!
Steve: Fautore 0.5.2.3 FILES.pm patch is up on the site. Thanks for the inputs. Keep it coming. We'll make Fautore a reality together.