#21
|
|||
|
|||
Re: secure communications
Your friend is [censored] on this one. No matter HOW secure he makes the communications, the guy on the other hand needs to be able to decrypt the message into some useful form. Your security leak is the other guy, not the security of the email, itself.
Anyway, look here: http://en.wikipedia.org/wiki/Pretty_Good_Privacy SpaceAce |
#22
|
|||
|
|||
Re: secure communications
this is why I wouldn't use email, but something like SILC or a custom web app.
|
#23
|
|||
|
|||
Re: secure communications
Just copy/paste the 40 pages speech near the end of Atlas Shrugged and put the numbers somewhere in the middle. I defy anyone to read that whole thing without skimming.
|
#24
|
|||
|
|||
Re: secure communications
The Mixmaster system can handle this situation.
It provides anonymous, two way communication. It's possible to communicate securly (to any third party attempting to monitor), without either party being able to identify the other, while still being able to prove that they're still communicating with the same person. So no spoofing either. It's a pain to setup, and non-trivial to use, so it's probably more a theoretical solution than a practical one. It's actually quite elegant in it's design. In addition, PGP/GPG do allow a flag to be set so that the messages recieved can only be temporarily decrypted to the screen. No plaintext is saved at any point. Barring screen shots or the like. |
#25
|
|||
|
|||
Re: secure communications
|
|
|