Button Ads!         


   

 


                  GrowStoreFinder.com Grow Shop Directory            1-15-2014                              GreenBookPages.com Grow Shop’s Directory Product Reviews 
         Local grow shops and hydroponic store locator with reviews                      
Find Local Hydroponics Shops and Grow Stores.   10-10-14  
                                                                          
                                                                       
Mega Text Ad’s Spaces Available! 
                    
                                                                                   Advertise On All 3 Of Our Marijuana Websites   

                                                                                                                
 
*****************************************************************************************************************************************************************************************************************

  We Update Daily!

Chris S. Kenoyer. Owner
MMJ Patient, Medical Activist,
Online Patients Advocate, 
Online MMJ News Journalist 

My Medical Bio 

Follow Us Now On Twitter
@MedicalMMJMan
 

 

Or Follow Us Now
  On Facebook

        Email Us Here
olpwebs@yahoo.com  

Or Email Us Securely Here
MedicalMMJMan@countermail.com 
NEW 100% Encrypted Email Server

OLP’s Free MMJ News EList  
Get The Latest In MMJ News

Press Contact Info

 Is CBD?  A Possible Cure For
Breast Cancer..? And All The Other
Many Forms & Types Of Cancer..?
Learn More About CBD Here

***************************

Advertise Here On OnlinePot
Rates As Low As  $50 a Year
24/7 – 365 Days A Year Of Sales! 

***********************************

Website Navigational Links
 

Main Start Page 2

**************************

Latest Marijuana News Reports

*********************************

Parody’s Cartoons US 
Government Grown Pot,
Term Papers, School 
Reports, & Thesis’s On  
Marijuana & Cannabis

*********************************

Amsterdam A to Z

********************************

Canadian Marijuana Websites

*******************************

Church’s & Pot Cannabis

*****************************

Co-Ops, Clinics, Dispensary’s 

*****************************

Marijuana Doctors & Clinics 

****************************

Pot Cooking Recipes

****************************

Drug Testing A To Z

***************************

Pot Games

****************************

Pot Songs Video’s

****************************

100’s Of Grow Guides  

***************************

Hash A- Z

***************************

Cannabis Legal Info, Drug 
Lawyers, State, Federal Laws, 
State  & Supreme Court Rulings

**********************

POW’s Of The MMJ War!

*****************************

Other Marijuana Websites 
Reciprocal Link Exchange

****************************

Medical Marijuana Studies, 
Research Report’s, Medical
Cannabis Clinic Study’s

****************************

Parody’s & Cartoons  
When We All Need A Good Laugh!  

****************************

Avoiding Online MOM Scammers
 
Newly Re-Updated Info!

*****************************

The Politics Of Contraband 
Medical Marijuana In The Mail?

******************************

The Hall Of Shame Section
The Online MOM Scammers 

*****************************

Online MOM Providers Ads

****************************

Politicians & Voters Rights

****************************

Medical Marijuana, Strains 

****************************

The OG  Marijuana Strain Guide

****************************

800+ FAQ Growing Questions

****************************

Patients Spiritual Guidance,
Free Online Crisis Help Center
 

****************************

Online Marijuana Seed Banks

****************************

Maximum Security Section 
      Just Updated!    

*****************************

Traveling Tips, Guides, B & B’s

****************************

Vaporizers A To Z

*****************************

Online Pot Video’s & Movies

**********************************************

Please Visit Both Of Our Sister Websites!

Maine Patients Coalition.org

The Reefer Madness Teaching Museum.org 

Listen Right Here Online! 
To Original 1930-1950’s
Reefer Madness Propaganda 
Radio Shows And Programs
Before TV There Were 
"Radio Stars"

   

 

   

*********************************

Legal Disclaimer

Guest Book

Translate Text or Web Page Go To:
Language Tools Google Translations

Article Submissions &  News
Reports Are Always Gladly
Accepted Here.

           

No part of this site maybe used or
reproduced in whole or in part
without the written consent of the
Copyright Owner
      www.onlinepot.org 

OLP ENTERPRISES L3C
1999-2014 Copyright
? All rights reserved

OnlinePot assumes no legal liability for any products, or information or  
news posted, services offered,  Or
any contests or give away’s offered.

 

 

Trying to Keep Your E-Mails Secret When the C.I.A. Chief Couldn?t

 

If David H. Petraeus couldn?t keep his affair from prying eyes as director of the Central
 Intelligence Agency, then how is the average American to keep a secret?

 

 

 Return Back To The Maximum Security Section Main Start Page
 And Check Out The Rest Of Our Security Data To Keep You Safe!

 &nbsp

   &nbsp

Correction Appended

If David H. Petraeus couldn?t keep his affair from prying eyes as director of the Central Intelligence Agency, then how is the average American to keep a secret?

In the past, a spymaster might have placed a flower pot with a red flag on his balcony or drawn a mark on page 20 of his mistress?s newspaper. Instead, Mr. Petraeus used Gmail. And he got caught.

Granted, most people don?t have the Federal Bureau of Investigation sifting through their personal e-mails, but privacy experts say people grossly underestimate how transparent their digital communications have become.

?What people don?t realize is that hacking and spying went mainstream a decade ago,? said Dan Kaminsky, an Internet security researcher. ?They think hacking is some difficult thing. Meanwhile, everyone is reading everyone else?s e-mails ? girlfriends are reading boyfriends?, bosses are reading employees? ? because it?s just so easy to do.?

Face it: no matter what you are trying to hide in your e-mail in-box or text message folder ? be it an extramarital affair or company trade secrets ? it is possible that someone will find out. If it involves criminal activity or litigation, the odds increase because the government has search and subpoena powers that can be used to get any and all information, whether it is stored on your computer or, as is more likely these days, stored in the cloud. And lawyers for the other side in a lawsuit can get reams of documents in court-sanctioned discovery.

Still determined? Thought so. You certainly are not alone, as there are legitimate reasons that people want to keep private all types of information and communications that are not suspicious (like the contents of your will, for example, or a chronic illness). In that case, here are your best shots at hiding the skeletons in your digital closet.

KNOW YOUR ADVERSARY. Technically speaking, the undoing of Mr. Petraeus was not the extramarital affair, per se, it was that he misunderstood the threat. He and his mistress/biographer, Paula Broadwell, may have thought the threat was their spouses snooping through their e-mails, not the F.B.I. looking through Google?s e-mail servers.

?Understanding the threat is always the most difficult part of security technology,? said Matthew Blaze, an associate professor of computer and information science at the University of Pennsylvania and a security and cryptography specialist. ?If they believed the threat to be a government with the ability to get their login records from a service provider, not just their spouse, they might have acted differently.?

To hide their affair from their spouses, the two reportedly limited their digital communications to a shared Gmail account. They did not send e-mails, but saved messages to the draft folder instead, ostensibly to avoid a digital trail. It is unlikely either of their spouses would have seen it.

But neither took necessary steps to hide their computers? I.P. addresses. According to published accounts of the affair, Ms. Broadwell exposed the subterfuge when she used the same computer to send harassing e-mails to a woman in Florida, Jill Kelley, who sent them to a friend at the F.B.I.

Authorities matched the digital trail from Ms. Kelley?s e-mails ? some had been sent via hotel Wi-Fi networks ? to hotel guest lists. In cross-checking lists of hotel guests, they arrived at Ms. Broadwell and her computer, which led them to more e-mail accounts, including the one she shared with Mr. Petraeus.

HIDE YOUR LOCATION The two could have masked their I.P. addresses using Tor, a popular privacy tool that allows anonymous Web browsing. They could have also used a virtual private network, which adds a layer of security to public Wi-Fi networks like the one in your hotel room.

By not doing so, Mr. Blaze said, ?they made a fairly elementary mistake.? E-mail providers like Google and Yahoo keep login records, which reveal I.P. addresses, for 18 months, during which they can easily be subpoenaed. The Fourth Amendment requires the authorities to get a warrant from a judge to search physical property. Rules governing e-mail searches are far more lax: Under the 1986 Electronic Communications Privacy Act, a warrant is not required for e-mails six months old or older. Even if e-mails are more recent, the federal government needs a search warrant only for ?unopened? e-mail, according to the Department of Justice?s manual for electronic searches. The rest requires only a subpoena.

Google reported that United States law enforcement agencies requested data for 16,281 accounts from January to June of this year, and it complied in 90 percent of cases.

GO OFF THE RECORD At bare minimum, choose the ?off the record? feature on Google Talk, Google?s instant messaging client, which ensures that nothing typed is saved or searchable in either person?s Gmail account.

ENCRYPT YOUR MESSAGES E-mail encryption services, like GPG, help protect digital secrets from eavesdroppers. Without an encryption key, any message stored in an in-box, or reached from the cloud, will look like gibberish. The sender must get a key from the recipient to send them an encrypted message The drawback is that managing those keys can be cumbersome. And ultimately, even though a message?s contents are unreadable, the frequency of communication is not. That is bound to arouse suspicions.

Wickr, a mobile app, performs a similar service for smartphones, encrypting video, photos and text and erasing deleted files for good. Typically, metadata for deleted files remains on a phone?s hard drive, where forensics specialists and skilled hackers can piece it back together. Wickr erases those files by writing gibberish over the metadata.

SET YOUR SELF-DESTRUCT TIMER Services like 10 Minute Mail allow users to open an e-mail address and send a message, and the address self-destructs 10 minutes later. Wickr also allows users to set a self-destruct timer for mobile communications so they can control how long a recipient can view a file before it disappears. But there is always the chance that your recipient captured screenshots.

DROP THE DRAFT FOLDER IDEA It may sound clever, but saving e-mails in a shared draft folder is no safer than transmitting them. Christopher Soghoian, a policy analyst at the American Civil Liberties Union, noted that this tactic had long been used by terrorists ? Khalid Shaikh Mohammed, the mastermind of the 9/11 attacks, and Richard Reid, ?the shoe bomber,? among them ? and it doesn?t work. E-mails saved to the draft folder are still stored in the cloud. Even if they are deleted, e-mail service providers can be compelled to provide copies.

USE ONLY A DESIGNATED DEVICE Security experts suggest using a separate, designated device for sensitive communications. Of course, few things say philanderer, or meth dealer, for that matter, like a second cellphone. (Watch ?Breaking Bad.?)

GET AN ALIBI Then there is the obvious problem of having to explain to someone why you are carrying a pager or suddenly so knowledgeable about encryption technologies. ?The sneakier you are, the weirder you look,? said Mr. Kaminsky.

DON?T MESS UP It is hard to pull off one of these steps, let alone all of them all the time. It takes just one mistake ? forgetting to use Tor, leaving your encryption keys where someone can find them, connecting to an airport Wi-Fi just once ? to ruin you.

?Robust tools for privacy and anonymity exist, but they are not integrated in a way that makes them easy to use,? Mr. Blaze warned. ?We?ve all made the mistake of accidentally hitting ?Reply All.? Well, if you?re trying to hide your e-mails or account or I.P. address, there are a thousand other mistakes you can make.?

In the end, Mr. Kaminsky noted, if the F.B.I. is after your e-mails, it will find a way to read them. In that case, any attempt to stand in its way may just lull you into a false sense of security.

Some people think that if something is difficult to do, ?it has security benefits, but that?s all fake ? everything is logged,? said Mr. Kaminsky. ?The reality is if you don?t want something to show up on the front page of The New York Times, then don?t say it.?


Correction: November 17, 2012, Saturday

This article has been revised to reflect the following correction: An earlier version of this article incorrectly stated that to read an encrypted e-mail, a recipient must obtain an encryption key from the sender. It is the sender that must get a key from the recipient to send them an encrypted message.

http://finance.yahoo.com/news/trying-keep-e-mails-secret-004210313.html