Saturday, August 10, 2013

Một Hãng Dịch Vụ Email khác Tự Nguyện Đóng Cửa để Không Bị Nhà Nước Mỹ bắt làm Tay Sai!



Một Hãng Dịch Vụ Email khác Tự Nguyện Đóng Cửa để Không Bị Nhà Nước Mỹ bắt làm Tay Sai!
Công ty Silent Email vừa thông báo đến khách hàng lý do họ tự nguyện đóng cửa, sau khi công ty Lavabit bị nhà nước Mỹ ép buộc đến phải "tự đóng cửa". (Những ai từng là công dân của chế độ Ngụy ngục VNCH, chắc đều nhớ "Tự Ý Đục Bỏ" của nền "tự do báo chí miền Nam" .
Đã đến lúc TẤT CẢ CHÚNG TA phải tự trau dồi những kiến thức căn bản để tự CHUYỂN GIẢI MÃ những thư từ trao đổi của chúng ta. Cryptography (http://www.irational.org/tttp/pgp/)
Ngu dốt không bao giờ có lý do chính đáng!!!

------------------------

To our Members:

  • Silent Circle has preemptively discontinued Silent Mail service to prevent spying.
    We designed our phone, video, and text services (Silent Phone, Text and Eyes) to be completely end-to-end secure with all cryptography done on the clients and our exposure to your data to be nil. The reasons are obvious -- the less of your information we have, the better it is for you and for us.
    Silent Mail has thus always been something of a quandary for us. Email that uses standard Internet protocols cannot have the same security guarantees that real-time communications has. There are far too many leaks of information and metadata intrinsically in the email protocols themselves. Email as we know it with SMTP, POP3, and IMAP cannot be secure.
    And yet, many people wanted it. Silent Mail has similar security guarantees to other secure email systems, and with full disclosure, we thought it would be valuable.
    However, we have reconsidered this position. We've been thinking about this for some time, whether it was a good idea at all. Yesterday, another secure email provider, Lavabit, shut down their system less they "be complicit in crimes against the American people." We see the writing on the wall, and we have decided that it is best for us to shut down Silent Mail. We have not received subpoenas, warrants, security letters, or anything else by any government, and this is why we are acting now.
    We've been debating this for weeks, and had changes planned starting next Monday. We'd considered phasing the service out, continuing service for existing customers, and a variety of other things up until today. It is always better to be safe than sorry, and with your safety we decided that in this case the worst decision is no decision.
    Silent Phone and Silent Text, along with their cousin Silent Eyes are end-to-end secure. We don't have the encrypted data and we don't collect metadata about your conversations. They're continuing as they have been. We are still working on innovative ways to improve secure communications. Silent Mail was a good idea at the time, and that time has passed.
    We apologize for any inconvenience, and hope you understand that if we dithered, it could be more inconvenient.

    Technologies To The People® Art Cryptography Tools
    Welcome to Art Cryptography®! With Art Encryption® for Personal Privacy, you can easily and securely protect the privacy of your e-mail messages and file attachments by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. A signed messages verifies that the information in it has not been tampered with in any way.

    Technologies To The People Art Public Keys Database

    There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, while asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems. Symmetric cryptosystems have a problem: how do you transport the secret key from the sender to the recipient securely and in a tamperproof fashion? If you could send the secret key securely, you wouldn't need the symmetric cryptosystem in the first place (because you would simply use that same secure channel to send your message). Frequently, trusted couriers are used as a solution to this problem. Another, more efficient and reliable solution is a public key cryptosystem, such as RSA, which is used in the popular security tool PGP.
    The Cypherpunks
    The Cypherpunks are a virtual community of people interested in the social and political impact of strong cryptographic algorithms.
    Digital Cash
    Links to information about the use of cryptographic algorithms to impliment anonymous and traceable digital case and net-based commerce.
    The National Security Agency Web Page
    The NSA is chartered with U.S. communications security (COMSEC) and foreign signals intelligence (SIGINT).
    DigiCrime, Inc.
    A full-service criminal computer hacking organization.
    United States Cryptography Policy
    Links to help you keep track of the ever-changing landscape of U.S. cryptography policy. What's legal this month and what isn't?
    Cryptography Information Sources
    Cryptography information. Mail me

No comments:

Post a Comment