Does your news feed closely resemble the plot of a Russian spy novel? It certainly might if you’ve been following the recent drama and mudslinging between the Democrats, the Russian government, the FBI, and the CIA, following the public release of private DNC emails. And that’s before the warnings of an “October Surprise” promised by WikiLeaks founder Julian Assange. Assange is threatening to release more confidential emails before the November election. Who needs fiction? [...]
Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the San Bernardino shooters). In January, while all of this was still a hypothetical question, RPost conducted a user poll for general interest [...]
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in RMail services, a member benefit of The Florida Bar. 1. True Direct Delivery – This system wraps [...]
The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent it. Once the official or corporate system is circumvented, security has devolved from professional (IT executive) to amateur (end user). Former Secretary of State Hillary Clinton’s use of a personal email system purportedly set up in her house by a colleague is a perfect, high profile e [...]
All service providers (such as lawyers, doctors, accountants, financial advisors, etc.) who believe their communications with clients are private — and in some situations, privileged — should take note. Conversely, all clients who believe their communications with trusted service providers are private should also take note. If you believe the revelations reported by The Guardian after a recent July 17th interview with NSA whistleblower Edward Snowden, you should consider [...]
On Thursday, August 8th, rather than allegedly allowing the U.S. government access to their users’ messages, two secure email services, Lavabit and Silent Circle’s Silent Mail, suddenly and voluntarily closed their doors. The publicity surrounding the shutdowns have once again led to questions about “how RMail encryption is different?” Store and forward systems, those systems that store messages and forward them as links, copies, or access are susceptible to the type of [...]
February 03, 2023
January 27, 2023
January 20, 2023
January 13, 2023
January 06, 2023