Ways to deliver your messages securely

Ways to deliver your messages securely and anonymous

We all use emails and instant messengers on daily basis, however we should know how to protect these messages from being intercepted or modified even though if the instant messaging or email service is secured via . There are different ways to deliver your messages securely I will mention the once I could trust plus additional ways to be and fight spam.
 
 
 

Securing your instant messaging on IPhone:

  • TNO solid paid secure text chat go for Threema. Excellent free alternative would be Wire which has web, desktop version, and video calls.
  • Free secure text chat go for Sicher or MyEnigma or Wickr. Avoid using WhatsApp and Telegram.
  • Another free secure text chat based on OTR go for Chatsecure.
  • For secure free voice calls go for Signal or Mumble.
  • For secure limited free time text and voice chat go for Seecrypt (Friend Synchronization is complicated).
  • For secure paid voice chat go for Silent Phone or Silentel.
  • To add extra layer of security on text chat you can use Opengp or iPGMail.

 
Blackphone is a smart phone that comes unlocked and features several pre-installed privacy tools, all fully enabled for at least two years of use.

 


 

Securing your emails:

  • For our company we use Google apps service. Though they are using SSL , TLS and point to point secure smtp (gmail to gmail) I wouldn’t trust these methods as they can be intercepted via in The Middle Attack MITM attacks.
  • For secure email service solution that benefits from a security conscious design and strong cryptography based on open standards S/MIME and OpenPGP. They also store all client data on a physical server bank in Switzerland go for kolabsys. For community edition of it go for Kolab. Another alternative Swiss based end to end , Fully Anonymous is Protonmail.
  • To have an end to end encryption and secure your emails or files sent through mail clients such as google apps go for here shareware or a free alternative is GPG4Win. For Iphone and IPAD use Opengp or iPGMail.
  • If you would like to integrate PGP with your webmail then go for Mailvelope.
  • To secure and encrypt Internet connection go for StealthWalker. To be anonymous you need to access the email within the Stealthwalker browser or use Tor Browser.
  • To encrypt emails at the gateway level go for Djigzo.
  • To easily encrypt files using web browser only go for Mini Lock.

 

Extra email utilities:

 

Untraceable emails:

First Method (Recommended):

  • Connect to any node via StealthWalker and launch Stealth Walker browser which is based on Tor network.
  • Register a new account with Yandex.
  • Send your email to the desired destination.
  • Never login to the account again using any other browser as the StealthWalker browser will never keep a trace of your online activities.
  •  

    Second Method:

    • Download Bundle and run it.
    • Use Yandex or Tor mail to create new account via Tor browser.
    • Send you email and close the Tor browser.

     
    You can use both methods to be on the web as well these methods will hide your real identify while posting on websites such as forums,blogs,facebook and twitter.
     


     

    Securing your instant messaging on PC:

    • For secure text chat with end to end encryption that implements perfect forward secrecy go for Cryptocat they also also offer mobile version now.
    • For secure free voice chat go for Mumble.
    • For secure voice and video chat use Wire or Jitsi. I would never use skype chat as its not end to end encryption find out why here.

     
    As I mentioned earlier you should first secure you connection via vpn tool like StealthWalker.

     


     

    Services to send self-destructing notes:

    • Compose a text only message on their servers via SSL with IOS and Android support go for Temp.
    • Web service using SSL to send secure self-destructing notes and get notified by email go for Privnote.
    • Web service using SSL to send secure self-destructing notes with control of number of views and days go for Quickforget.

     


     

    Resources:

     

    • For full review on secure messaging by EFF please visit this post.
    • To know more about encryption please read this document.
    • To know more about IOS security please read this document.
    • To know more about Wire security white paper please read this document.
    • To know more about Wire privacy white paper please read this document.
    • To know more about Threema security white paper please read this document.

     


     

    Digiprove sealCopyright protected by Digiprove © 2013-2016 Eagle Eye Digital Solutions
    JOIN OUR NEWSLETTER
    Amazing people have subscribed to our newsletter — and you’re amazing too!
    We hate spam. Your email address will not be sold or shared with anyone else.
    The following two tabs change content below.
    Warith Al Maawali
    W. AL Maawali is the Founder and Chief Editor of Eagle Eye Digital Solutions from the Sultanate of Oman with over 20 years experience in Security and Digital Forensics. He is also the Founder of om77.net.
    SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.
    Anonymity is when the assurance that the data collection cannot be traced back to the participant in the research project, completely anonymous.
    The man-in-the middle attack intercepts a communication between two systems. For example, in an http transaction the target is the TCP connection between client and server. Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server, as shown in figure 1. Once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication.
    Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
    Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication.
    Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication.
    VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company’s internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data.
    Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
    Anonymity is when the assurance that the data collection cannot be traced back to the participant in the research project, completely anonymous.
commentJoin the Discussion

Pin It on Pinterest