Comments have been disabled
Responses: 8
CPT Jack Durish
Once upon a time messages passed from communications center to communications center via highly encrypted systems (the most sensitive were encrypted before being transmitted via encrypted systems; that is, encrypted withing encryption). Between the originator and the communication center and the communication center and the addressee, they were printed on paper. Secure desktop to desktop communications had to wait until dual-key encryption came along. That is, the sender used one key to encrypt the message and the addressee another to decipher it. The level of security depended on the complexity of the keys (32-bit, 64-bit, etc). Now, I've been out of the loop for more than a decade but I'll bet the problems are still the same. It doesn't matter how secure you build a system, the weak link will always be the user. Encryption, indeed all forms of security, require some extra effort on the part of the user and users are lazy. They will circumvent secure systems every time to save a little effort. Dual key systems require that users secure their keys. They don't. Of course, even if they are careful and make the extra effort, the most important messages will always end up in the hands of a member of Congress and that's about as secure as telling the town gossip. Good luck all...
SGT James Murphy
Just googled this https://blog.fastestvpn.com/10-secure-email-providers-you-need-know-about/
and the one I use isnt' even on here. I use Black Phone. "For Work"....That really the guys from Silent Circle if you know them... https://www.silentcircle.com/
SrA Edward Vong
There's a will there's a way. No such thing as "secure" e-mail.
SGT James Murphy
SGT James Murphy
5 y

Join nearly 2 million former and current members of the US military, just like you.

close