
Mind you................................... there was a time.

erolz66 wrote:Paphitis wrote: So you have 2 factor authentication.
Just chucking around terms you do not understand does NOT make you more secure. 2 factor authentication does not mean using the same authentication method twice lol.Paphitis wrote: I can also self destruct the email body and attachments after an preset time period of my choosing. whereby the email is deleted from the server. That can be from 1 minute to as long as I like, 24 hours, 1 day, 1 week, or 1 month.
You said you can do this 'without the recipient knowing it' lol. Well if I am a recipient and in order to read your 'email' I have to log on to the server you designate, use an encryption key you have sent me via some 'secure' means , that is no longer email is it and even if you claim it is email, I might actually be aware that if I can only view the 'email' sent to me by using a server not controlled by me, then yeah maybe the person who controls that server will decide if and when to delete the emails on it.Paphitis wrote:I don't send secure emails to Amazon. I just use generic unsecured email for stuff like that.
You do not send emails to ANYBODY that way lol. Despite what you might think you are not James Bond lolPaphitis wrote:If the other party does not agree to use such a platform for the information that warrants such security, then they have no business accessing that information in the first place.
So this is how you email your bank is it lol ? And if they refuse to use your secure end to end system you tell them they have no business controlling your bank accounts. This is how you email local tax departments is it ? Any government department or service is it ? Your accountant ? You really are such a plonker at times Paphitis.
erolz66 wrote:This is not email. You send someone an email to tell them there is a message on some third party server. This is not email in exactly the same way sending someone an email saying there is a private message on this forum for them, is not email. To call it email is to not understand what email is. What the universal protocols are that define email as email. You are not expert in these things you just think you are which is why it does not surprise me one bit that you have been a victim of ID fraud.
Paphitis wrote:erolz66 wrote:This is not email. You send someone an email to tell them there is a message on some third party server. This is not email in exactly the same way sending someone an email saying there is a private message on this forum for them, is not email. To call it email is to not understand what email is. What the universal protocols are that define email as email. You are not expert in these things you just think you are which is why it does not surprise me one bit that you have been a victim of ID fraud.
It's email alright.
the only difference is that this email is secured with discrete ports, hosted by a server where the recipient must visit in order to access, and only after entering the correct key.
So the email doesn't leave that particular server.
erolz66 wrote:Paphitis wrote:erolz66 wrote:This is not email. You send someone an email to tell them there is a message on some third party server. This is not email in exactly the same way sending someone an email saying there is a private message on this forum for them, is not email. To call it email is to not understand what email is. What the universal protocols are that define email as email. You are not expert in these things you just think you are which is why it does not surprise me one bit that you have been a victim of ID fraud.
It's email alright.
the only difference is that this email is secured with discrete ports, hosted by a server where the recipient must visit in order to access, and only after entering the correct key.
So the email doesn't leave that particular server.
Which means it is not email. Email works on global open protocols, SMTP, POP3, IMAP etc. Which is why you can receive and send your email from any number of clients on any number of devices via any servers using the same protocols. What you are calling email works on closed proprietary protocols on closed specific servers, complete with it's own specific single point of failure ,the server itself and the people who run it which is not you or the person receiving the mail). Thus it is not email. It' s like me claiming to have end to end email encryption because when I want to send an email I send one telling the person to log on to telegram and collect the mail message via that, which does have end to end encryption. Arguing with you is pointless. You believe you have end to end encryption on emails and that you can delete emails sent to people without them knowing that you can or have deleted them if it makes you feel superior and clever and safe. To me and anyone who understands this stuff it just shows both your ignorance and your inability to even understand you are ignorant. Not a good combo if security is your priority.
erolz66 wrote:Paphitis wrote:erolz66 wrote:This is not email. You send someone an email to tell them there is a message on some third party server. This is not email in exactly the same way sending someone an email saying there is a private message on this forum for them, is not email. To call it email is to not understand what email is. What the universal protocols are that define email as email. You are not expert in these things you just think you are which is why it does not surprise me one bit that you have been a victim of ID fraud.
It's email alright.
the only difference is that this email is secured with discrete ports, hosted by a server where the recipient must visit in order to access, and only after entering the correct key.
So the email doesn't leave that particular server.
Which means it is not email. Email works on global open protocols, SMTP, POP3, IMAP etc. Which is why you can receive and send your email from any number of clients on any number of devices via any servers using the same protocols. What you are calling email works on closed proprietary protocols on closed specific servers, complete with it's own specific single point of failure ,the server itself and the people who run it which is not you or the person receiving the mail). Thus it is not email. It' s like me claiming to have end to end email encryption because when I want to send an email I send one telling the person to log on to telegram and collect the mail message via that, which does have end to end encryption. Arguing with you is pointless. You believe you have end to end encryption on emails and that you can delete emails sent to people without them knowing that you can or have deleted them if it makes you feel superior and clever and safe. To me and anyone who understands this stuff it just shows both your ignorance and your inability to even understand you are ignorant. Not a good combo if security is your priority.
erolz66 wrote:erolz66 wrote:Paphitis wrote:erolz66 wrote:This is not email. You send someone an email to tell them there is a message on some third party server. This is not email in exactly the same way sending someone an email saying there is a private message on this forum for them, is not email. To call it email is to not understand what email is. What the universal protocols are that define email as email. You are not expert in these things you just think you are which is why it does not surprise me one bit that you have been a victim of ID fraud.
It's email alright.
the only difference is that this email is secured with discrete ports, hosted by a server where the recipient must visit in order to access, and only after entering the correct key.
So the email doesn't leave that particular server.
Which means it is not email. Email works on global open protocols, SMTP, POP3, IMAP etc. Which is why you can receive and send your email from any number of clients on any number of devices via any servers using the same protocols. What you are calling email works on closed proprietary protocols on closed specific servers, complete with it's own specific single point of failure ,the server itself and the people who run it which is not you or the person receiving the mail). Thus it is not email. It' s like me claiming to have end to end email encryption because when I want to send an email I send one telling the person to log on to telegram and collect the mail message via that, which does have end to end encryption. Arguing with you is pointless. You believe you have end to end encryption on emails and that you can delete emails sent to people without them knowing that you can or have deleted them if it makes you feel superior and clever and safe. To me and anyone who understands this stuff it just shows both your ignorance and your inability to even understand you are ignorant. Not a good combo if security is your priority.
The system you use Paphitis is inherently less secure and reliable and flexible in principle and in practice than other systems that have existed much longer but that your are either too ignorant or lazy to use. Your system requires you and the recipient to communicate via a third party that is in essence unknown to you. If their servers have downtime you can not communicate. If they have failure or data loss your communications are lost. If they cease trading your communications are lost. If they are hacked your communications are compromised and or lost. If they have a rouge employee your communications are lost or compromised. If you were serious about security of emails you would just use PGP encryption and an email client that supports such in agreement with those you wish to communicate with securely. You would pass your public PGP key to them in person physically and they theirs to you. Your emails would travel over the existing open email systems using existing email protocols and not be dependent on you and the recipient trusting a third party at all or be subject to any single point of failure issues. You do not do this because you are not the 'smart IT security expert' you think you are. Snowden would never use a system that required a trusted third party when there are system that do not. That is just basic security principal.
Paphitis wrote:Sorry, but these servers DO support IMAP, SMTP and POP3 protocols. You can easily configure it to be used with Outlook, and Thunderbird.
Paphitis wrote:If I email a generic web based email account like GMAIL or HOTMAIL, the recipient only gets an email saying they have recieved an email from me.
They can't view the email in their web based platform, or in outlook. They are presented with a link that takes them to a secure server. Once they are there, they have to enter the relevant key, which I would deliver from another secure means. That means, another end to end encryption platform.
Paphitis wrote:I am so pedantic about everything and my security right down to my emails which are encrypted end to end.
Paphitis wrote:The only issue with this is that end to end encryption only exists between those who share the same email service.
If they don't, then the email is only encrypted at your end but not at the recipients end. Which is fine for 98% of situations. I don't normally worry about it when I am sending neutral emails concerning any Amazon orders, or reminding my wife about our shopping list or talking to the mechanic about my car's servicing etc etc. In fact, for trivial matters like this, I even use Outlook, and Gmail which isn't encrypted at all.
Paphitis wrote: It really doesn''t matter if other parties intercept and read your emails most of the time now does it?
Paphitis wrote:I am so pedantic about everything and my security right down to my emails which are encrypted end to end.
Paphitis wrote:The system I use is PGP as well, but this method leaks the title of your email message and also the titles of your attachments.
Paphitis wrote:If I email a generic web based email account like GMAIL or HOTMAIL, the recipient only gets an email saying they have recieved an email from me.
Paphitis wrote:A better system is PGP/inline and PGP/Mime which is the preferred method.
Return to Internet, Computers and Technology
Users browsing this forum: No registered users and 0 guests