Encrypted Email The History and Technology of Message Privacy
This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software prot
- PDF / 3,781,656 Bytes
- 102 Pages / 439.37 x 666.142 pts Page_size
- 79 Downloads / 242 Views
Hilarie Orman
Encrypted Email The History and Technology of Message Privacy 123
SpringerBriefs in Computer Science Series editors Stan Zdonik Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert Katsushi Ikeuchi Bruno Siciliano Sushil Jajodia Newton Lee
More information about this series at http://www.springer.com/series/10028
Hilarie Orman
Encrypted Email The History and Technology of Message Privacy
123
Hilarie Orman Purple Streak, Inc. Woodland Hills, UT USA
ISSN 2191-5768 ISSN 2191-5776 (electronic) SpringerBriefs in Computer Science ISBN 978-3-319-21343-9 ISBN 978-3-319-21344-6 (eBook) DOI 10.1007/978-3-319-21344-6 Library of Congress Control Number: 2015944454 Springer Cham Heidelberg New York Dordrecht London © The Author(s) 2015 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper Springer International Publishing AG Switzerland is part of Springer Science+Business Media (www.springer.com)
Preface
Like most people, I hope that my email is only being read by the people I send it to, but I realize that my hope is unfulfilled by ordinary email technology. Though almost everyone recognizes the importance of Web site security, their email, which might be much more personal, is rarely protected. In light of the unending revelations of insecure practices by Web site owners and the general uneasiness over surveillance by governments, a few people suggested to me that email privacy would be worthwhile. I was pleased to find that almost all my computing devices had preinstalled email clients with privacy controls. Mind you, this was not surprising to me, because I first used secure email about twenty-five years ago. I felt that I understood the underlying cryptology and Internet protocols, if not in detail, at least in general design. How hard could it be to use today’s tools? I set out on my secure email adventure with as little understanding of my task as a neophyte
Data Loading...