“Apple’s and Google’s war for the phone in our pockets is the biggest clash since Apple v Microsoft for the space on our desktops” and, according to Robert Lane Greene, likely to impact the way we experience the world around us. www.robertlanegreene.com
“In a world of repressive governments and a growing reliance on insecure networks, there’s no way anyone can be sure their most sensitive messages aren’t intercepted by the forces of darkness. But you can make it mathematically improbable that all but the most well-funded snoops could ever make heads or tales of your communications.” Use Dan Goodin’s step-by-step guide to email encryption and keep your communications private. www.theregister.co.uk
Do not use electronic greeting cards. While these are fun and easy to send, they place your email address and that of your friend into a database. Unfortunately, many greeting card sites are mere collection points for email addresses and make money by selling on their database to spammers.
“It may not be surprising for you to learn that email is not a secure medium of communication; however, it may surprise you to learn just how inherently insecure it really is.” Erik Kangas on how email really works, what the security issues are and where you can make the difference. luxsci.com (PDF file, 112 kb)
“Spammers use HTML emails to confirm your address.” There are other drawbacks to using HTML-formatting when sending and receiving emails. Consider this list of potential pitfalls that Martin Favreau has compiled for you. www.freeantispam.org
“The bottom line is, if your email passes through or is stored on servers controlled by others, it’s probably a good idea to consider encryption.” Joe Brockmeier considers the confidentiality of your messages. www.newsforge.com
“Internet life carries its own versions of courtesy, privacy and security issues that all users need to know.” This article discusses basic email etiquette and explains the proper use of the To, CC and BCC fields when sending emails. www.bestprac.org
Kelly Martin has become the victim of identity theft. A security professional by trade, he reflects on the many ways that personal data, stored on your computer, can fall into the wrong hands. www.theregister.co.uk