Talk:Email encryption

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computing (Rated Stub-class)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Stub-Class article Stub  This article has been rated as Stub-Class on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
 
WikiProject Internet (Rated Stub-class, High-importance)
WikiProject icon This article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Stub-Class article Stub  This article has been rated as Stub-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.
 

Is Encyption really this useless?[edit]

One might think some government employees and corporate employees would need encrypted e-mail, especially to some foreign countries. What effect has proxy servers on certificates & keys? Encryption & Signing are buttons clearly available to Apple Mail users, so they will want to know about these.

Encryption usually comes with email authentication, often from CAcert.org, in light of the demise of Thawte. (The email authentification of ip addresses is depricated because of spoofing; but the inability to reply would seem to protect the sender, and accepting only mail from those written should protect others.)

People might like to know where to look in their mailing agent's 'Prefereces' for security certificate authorities. My Thunderbird on Ubuntu Linux doesn't have CAcert.org, but it does have dozens of others, though I see no PGP keys (as I did on a MacOSX). Practical matters, such as validating & revocing certificates are of great interest. Which authorities are reputable, and provide free public & private keys for encryption?

Sorry about encorporating ip 'authentication', but the two are often bagged together. Geologist (talk) 00:21, 21 January 2012 (UTC)

RfC concerning the Lavabit email service[edit]

There is a request for comments (RfC) that may be of interest. The RfC is at

Talk:Lavabit#RfC: Should information about Lavabit complying with previous search warrants be included?

At issue is whether we should delete or keep the following text in the Lavabit article:

Before the Snowden incident, Lavabit had complied with previous search warrants. For example, on June 10, 2013, a search warrant was executed against Lavabit user Joey006@lavabit.com for alleged possession of child pornography.

Your input on this question would be very much welcome. --Guy Macon (talk) 04:44, 29 August 2013 (UTC)