INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES



Similar documents
Webmail Using the Hush Encryption Engine

Certified Secure Computer User

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Wireless Presentation Gateway. User Guide

Chapter 7 Transport-Level Security

A Guide to Mobile Security For Citizen Journalists

Improving Online Security with Strong, Personalized User Authentication

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Encrypting your Communications using PGP

Chapter 17. Transport-Level Security

INSTANT messaging is a kind of online chat offering a realtime

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Certified Secure Computer User

Information Security

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!

How To Secure Your From Being Hacked On A Pc Or Mac Or Ipad (For Free) For A Long Time (For A Long Period Of Time) For Free (For Commercial) For Your Money (For Business) For The Long Term

Getting Started with VMware Horizon View (Remote Desktop Access)

Carroll Hospital Center

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Customer Education to Combat Scams and Fraud

Multi-Factor Authentication for first time users


CNT Computer and Network Security Review/Wrapup

Manual for Android 1.5

Cloud Computing for Education Workshop

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Detailed Description about course module wise:

IT Networks & Security CERT Luncheon Series: Cryptography

Kaspersky Security 10 for Mobile Implementation Guide

SingTel VPN as a Service. Quick Start Guide

Spring Hill State Bank Mobile Banking FAQs

Two Factor Authentication - USER GUIDE

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Transport Level Security

Advanced Authentication

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

Category. 1. Download and Install Run CooCall client and go to the Web Registration and Configuration User Settings...

Everyday Cryptography

FAMILY. Reference Guide. Pogoplug Family. Reference Guide Cloud Engines, Inc. All Rights Reserved.

Thexyz Premium Webmail

The science of encryption: prime numbers and mod n arithmetic

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

The Case For Secure

Fundamentals of Network Security - Theory and Practice-

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Kaspersky Security for Mobile Administrator's Guide

Chapter 8. Network Security

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Why you need secure

COSC 472 Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Wireless Network Best Practices for General User

Mobile Learning Apps. Distance Learning (860) Founders 131/131A Middlesex Community College

How To Protect Your From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo

Facebook Smart Card FB _1800

Mobile Office Security Requirements for the Mobile Office

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Chapter 10. Network Security

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version

SSL/TLS: The Ugly Truth

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Compter Networks Chapter 9: Network Security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Trust Digital Best Practices

Out of the office? Not out of touch! The basics of internet telephony By Neil G. Oberman., LL.M. Spiegel Sohmer Inc.

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

GPG - GNU Privacy Guard

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

mystanwell.com Installing Citrix Client Software Information and Business Systems

Angel Dichev RIG, SAP Labs

Network Security Essentials Chapter 5

Secure in times of rising mobile communication

How To Understand The History Of The Web (Web)

U.S. Mobile Benchmark Report

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)

Introduction to Cryptography

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Mobile Communicator for Mobile Devices

999GPS.net Tracking Platform Operation Guide

Savitribai Phule Pune University

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

SafeCall Secure Communication System

How do I start a meeting?

Transcription:

INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES AN AMP-3 PREPAREDNESS PRIMER Resources Compiled and Printed by Amp-3, LLC V2.0 rev April 2014

! INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES AMP- 3, LLC Preparedness Brief APB MAR 2014 v3.0 revapr14 amp- 3.net ACTION ITEMS http://www.amp-3.net GET OFF Facebook, Twitter, All Things Google, All Social Media NOW! DO NOT USE Internet Explorer or Google Chrome START using SECURE internet & email DEVELOP a secure password protected USB drive for your important files ARTICLES TO READ Keep Uncle Sam Out Of Your Inbox With Our Layman s Guide To Email Encryption http://www.digitaltrends.com/how-to/how-to-pgp-encrypt-email-mac-mail-app/ The Secure email Challenge http://www.newyorker.com/online/blogs/elements/2013/11/the-daunting-challenge-ofsecure-e-mail.html COUNTERMAIL: Hushmail Alternative Review http://www.hacker10.com/internet-anonymity/one-year-review-of-anonymous-emailservice-countermail/ THREAT LEVEL: Encrypted E-Mail Company Hushmail Spills to Feds http://www.wired.com/threatlevel/2007/11/encrypted-e-mai/ MAC - Apple security flaw could allow hackers to beat encryption http://www.reuters.com/article/2014/02/22/us-apple-flaw-idusbrea1l01y20140222 MAC - How to encrypt your email http://www.macworld.com/article/2041083/how-to-encrypt-your-email.html MAC - Encrypt your OS X email and files the easy way http://www.zdnet.com/encrypt-your-os-x-email-and-files-the-easy-way-7000016986/ How To Protect Your PC From PRISM http://www.pcworld.com/article/2041044/how-to-protect-your-pc-from-prism.html How To Hide Your House From Google Maps http://www.offthegridnews.com/2013/10/30/how-to-hide-your-house-from-google-maps/ HACKER10 - USB Encryption Information http://www.hacker10.com/usb-encryption/ SECURITY: The Resistance Security Manual RECOMMENDED: get this from Forward Observer Magazine [$10 Download] http://forwardobservermagazine.com/product/security-the-resistance-security-manual

USEFUL WEBSITES Charles Carroll Society http://charlescarrollsociety.com http://itunes.apple.com/us/podcast/charles-carroll-society-traditionalist/id555325971?mt=2 SecureMac How Secure is Your Mac? http://www.securemac.com Off The Grid News http://www.offthegridnews.com AmRRON American Redoubt Radio Operators Network http://www.amrron.com Radio Free Redoubt http://www.radiofreeredoubt.com Hacker10 Security Hacker / Computer Security http://www.hacker10.com/ GuerrillAmerica - Making Patriots More Dangerous to Tyranny Since 2011 http://guerrillamerica.com Forward Observer Magazine http://forwardobservermagazine.com Forward Observer Magazine Spring 2014 http://forwardobservermagazine.com/product/fo-spring-2014 Dr. Katherine Albrecht: RFID & SPYCHIPS http://www.spychips.com/ http://en.wikipedia.org/wiki/katherine_albrecht http://www.youtube.com/watch?v=1q2fssg1lk8! SECURITY PRIVACY CRYPTO RESOURCES INTERNET PRIVACY RESOURCES StartPage http://www.startpage.com/eng/protect-privacy.html Ghostery https://www.ghostery.com Tor Browser Bundle The Tor Project is a US 501(c)(3) non-profit dedicated to the research, development, and education of online anonymity and privacy. http://www.torproject.org/projects/torbrowser.html.en

HTTPS EveryWhere Plug-In http://www.eff.org/https-everywhere SECURE EMAIL RESOURCES HushMail - Web based support for PGP encryped email and digital signatures, computer IP hidden in the headers, company headquarters based in Canada http://www.hushmail.com CounterMail!"!Supports OpenPGP encryption and digital signatures for webmail, it also hides your IP on the headers, servers located in Sweden http://countermail.com InstanceMail http://instancemail.com StartMail http://beta.startmail.com The Enigmail Project OpenPGP Email Security for Mozilla Applications http://www.enigmail.net/home/index.php http://www.hacker10.com/encryption-software-2/email-encryption-with-vaultletsuite-2-go/ http://www.hacker10.com/other-computing/autonomy-central-email-encryption-andsecure-notes/ CryptoHeaven http://www.cryptoheaven.com AutonomyCentral http://www.valeso.com/products/index.html GPGMail 2.1 for Mavericks Everything you need to get started with secure communication and encrypting files in one simple package http://gpgtools.org/gpgmail/index.html PGP - Pretty Good Privacy http://en.wikipedia.org/wiki/pretty_good_privacy http://cryptography.org/getpgp.htm Off-The-Record Communication: Why Not to Use PGP https://otr.cypherpunks.ca/otr-codecon.pdf TrueCrypt http://www.truecrypt.org/downloads i2p http://en.wikipedia.org/wiki/i2p http://geti2p.net/en/

TAILS http://en.wikipedia.org/wiki/the_amnesic_incognito_live_system http://tails.boum.org/ CRYPTOLOGY: One-Time Pad (OTP) Resources OTP Precautions Create one-time pads with truly random digits Never ever use a one-time pad more than once Destroy the one-time pad immediately after use Dirk Rijmenants' Cipher Machines and Cryptology http://users.telenet.be OTP One Time Pad http://users.telenet.be/d.rijmenants/en/otp.htm Guide to Secure Communications with the One-Time Pad Cipher How to set up secure communications with one-time pad http://users.telenet.be/d.rijmenants/papers/one_time_pad.pdf OTP Six-Sided Die Template [ Your PRIVATE Random Number Generator! ] http://users.telenet.be/d.rijmenants/d10.pdf OTP Random Number Generator (RNG) http://users.telenet.be/d.rijmenants/en/otp.htm#software Is the One-Time Pad History? http://users.telenet.be/d.rijmenants/papers/is_one_time_pad_history.pdf OTP One-Time Pad Cryptology http://babkjl.wordpress.com/2012/03/18/one-time-pad-cryptography PRIVACY PRODUCTS ShieldSak lightweight fabric Faraday cage made for the U.S. Military and Government PROVEN to block Radio Frequencies ( RF ), Infrared and Skim/Quick Scan Technology that can steal your critical information http://www.loksak.com/products/shieldsak PrivacyCase - military-grade shielding technology blocks unwanted GPS location-tracking and real-time audio/video eavesdropping http://www.privacycase.com OffPocket - A sleek countersurveillance tool that blocks signals from entering or exiting the case http://offpocket.com SMART PHONE / TABLET APPS BurnerPhone - the simplest, most secure, and most affordable prepaid cell phone kit in the US. The Burner Kit - a quality disposable cell phone with unlimited voice and SMS messaging for 30 days http://www.burnerphone.us/

RedPhone ANDROID APP from WhisperSystems that provides endto-end encryption for your calls, securing your conversations so that nobody can listen in TextSecure - ANDROID APP from WhisperSystems that encrypts your text and chat messages over the air and on your phone http://whispersystems.org/ NOTES / DEFINITIONS Burner - a privacy layer app for your iphone or Android that provides disposable phone numbers for your iphone or ANDROID that you control at the push of a button http://burnerapp.com/ Hushed - makes it easy to create private numbers without hassle, significant expense, or commitment. Use Hushed whenever you need to contact or be contacted but don t want to share your private information http://hushed.com/ Public-Key Cryptogrphy, aka Asymmetric Key Encryption, refers to a cryptographic algorithm, which requires two separate keys, of which is a secret or private key and one of which is a public key. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other as contrasted with conventional ("symmetric") cryptography, which relies on the same key to perform both. SOURCE: http://en.wikipedia.org/wiki/public-key_cryptography