Encrypt your emails with free software for Windows, Mac, Or Linux

Published:

Why encrypt your emails??

Because everything in your emails is public info. Any time you send a non encrypted email: It's like a postcard for anyone with the know how to read it's contents.

Blackmail, manipulation, and stealing is easy when bad people have this sort of info on you. Imagine someone intercepted an email and found out you were rich, found out your home address from some email receipts, and you also sent out a non encrypted email to a friend that you were going to be on vacation from X to Y dates... With that, you're basically giving the criminal a timeframe to rob your house. Granted, I think most people are good and the average person is never going to have to worry about any of this, but just in case you need some extra security: I hope this blog will teach you to help mitigate these risks. Let's begin!

First, mitigate potential damage with low tech options

  1. Start using a PO Box for more privacy: Because when you use and ship things you bought to your home address, your personal info usually comes in an email receipt exposing all this detail. What you bought, how much it cost, where it's being shipped to, etc. Don't forget that the box is most likely sitting outside for people to steal it for hours until you get home. So pick it up at the post office. They have services that let you do this.
  2. Opt out of financial updates: Don't let your bank or any other financial institution send you updates on the amount you have in your accounts. No details on what you own should be visible. Since they don't encrypt their emails to you, the best defense is to opt out of their updates.

Tools of the trade: Thunderbird, GPG, PGP, and Enigmail

The following works for Windows, Mac, Linux, and any email account like Gmail, Yahoo, or your private domain.

How this works, and extra details

When writing an encrypted email to someone, you need their public key. Their public key is used to encrypt the message, and only the private key they created with it can decrypt it. Likewise with yours. So if Jane and Joe want to send encrypted messages back and forth, they must first create their own public/private keys, then give their public keys to each other. Their private keys must stay private. Joe never gives his private key away, nor does Jane. Only their public keys are public.

Now when Jane has Joe's public key, she encrypts her messages to him with HIS PUBLIC key by clicking the lock icon to the ON position in Thunderbird. When he gets it, he clicks the message, and a window prompts him for his private key's password to see the encrypted message. And when Joe wants to send an encrypted message to her, he uses HER PUBLIC key to encrypt it, and she uses her private key to decrypt it. You can also sign your messages, letting people know that you are the one who sent it. Just click the pen / signing button right next to the lock before sending your email.

Remember, PUBLIC keys are PUBLIC. You can put them anywhere for anyone to see. You can also email them to your friends to download before they say any private details. Just exchange public keys first. Though before you put it in the public, I suggest removing your email from the file name, because bots on the internet are likely to scrape that detail and start sending spam to it. And if you want to be a little more private about it and not let your public keys be TOO public for some reason: meet in person and exchange the keys with a USB drive.

If you want to try sending an encrypted email to me, go to my contact page, download my public key, and send me a message!

I hope this helps in taking back your privacy.

And if anyone needs any web apps or a web site that doesn't censor you for unpopular opinions, contact me.

--Kevin

Hover to share Hover to share Share+
SMS BRIGHTEON. SOCIAL MEWE H DIGG SU in Share by email Share by email Share by SMS Share by SMS Share by Gab Share by Gab Share by Telegram Share by Telegram Share by Minds Share by Minds Share by Diaspora Share by Diaspora Share by Brighteon.social Share by Brighteon.social Share by MEWE Share by MEWE Share on Hacker News Share on Hacker News Share by VK Share by VK Share by Pocket Share by Pocket Share by Digg Share by Digg Share by Stumble Upon Share by Stumble Upon Share by Delicious Share by Delicious Share by WhatsApp Share by WhatsApp Share by Reddit Share by Reddit Share by Parler Share by Parler Share by LinkedIn Share by LinkedIn Share by FaceBook Share by FaceBook Share by Twitter Share by Twitter Share by Pinterest Share by Pinterest Share by Tumblr Share by Tumblr

Similar Posts

Stay updated with tips by subscribing to my rss 2 or atom 1 feeds, or signing up to my email list.