View Single Post
Old 07-07-2012, 03:18 AM   #20
Tibaveriafark

Join Date
Nov 2005
Posts
419
Senior Member
Default
Awoke, it would benefit you to learn about PGP/GPG encryption...

You can encrypt files with your private key, so that only you can decrypt it.

You can exchange public keys and send encrypted messages to others.

So if you use GMail, for example, you can encrypt a message using my public key, so that only I can decrypt it with my private key, and no one but us is privy to the contents of the email. GMail simply becomes a carrier by which random data (well, random to those without the key and the password associated with it) is exchanged between two parties.

Seriously, if you are worried about this kind of privacy, you would do well to look into PGP and Tor.
To your last point, I've always been leery of Tor, being that it was developed by the US Govt. I have always been of the opinion that since there is no feasible way to meaningfully sift through all of the data online, that they use programs like that to catch people who try to hide things. Kinda like how they go after people who turn on side streets coming up to DUI checkpoints.

I understand how Tor works, and how the 3rd server doesn't know anything about the 1st server and so on, but it is my opinion that the Gov runs at least one of the servers and scans the info, if it is deemed important to them they then do follow the trail through.

I think the strongest reason for encryption is plausible deniablity. It is also my understanding that under the DMCA that it is illegal for someone (anyone) to hijack and decrypt a transmission that they were not the recipient of. A case which would certainly hold up in a just court, the problem being those are few and far between.
Tibaveriafark is offline


 

All times are GMT +1. The time now is 09:58 AM.
Copyright ©2000 - 2012, Jelsoft Enterprises Ltd.
Design & Developed by Amodity.com
Copyright© Amodity