Getting the most from Apple Mail

Similar documents
Network Security (2) CPSC 441 Department of Computer Science University of Calgary

SECURITY IN NETWORKS

Chapter 7: Network security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

What is network security?

Network Security. HIT Shimrit Tzur-David

Principles of Network Security

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

How To Encrypt Data With Encryption

Published : License : None

Division of Information Technology Lehman College CUNY

Internet Encryption S/Mime Standard

OS X Yosemite - Features

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Google Apps for Education at UTK

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Migration User Guides: The Console Application Setup Guide

Properties of Secure Network Communication

The End is Near. Options for File Management and Storage

Document OwnCloud Collaboration Server (DOCS) User Manual. How to Access Document Storage

isecur User Guide for iphone

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

CRYPTOGRAPHY IN NETWORK SECURITY

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365

Chapter 8 Network Security

CSCE 465 Computer & Network Security

How to wipe personal data and from a lost or stolen mobile device

Booth Gmail Configuration

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Encrypting your Communications using PGP

Initial Setup of Mozilla Thunderbird with IMAP for OS X Lion

Security in Computer Networks

BOTTOM UP THINKING SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Information Technology Services. Your mailbox is moving to the cloud. Here is what to expect.

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Signing and Encryption with GnuPG

Savitribai Phule Pune University

Signing and Encryption with GnuPG

Lotus Notes 8.5 to Office 365 for business

Using etoken for Securing s Using Outlook and Outlook Express

Office of Information Technology Connecting to Microsoft Exchange User Guide

Configuring on Android Devices

GREEN HOUSE DATA. Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

HOW WILL I KNOW THAT I SHOULD USE THE IAS CONTINUITY SERVICE?

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Students Mobile Messaging Registration & Configuration

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Webmail. Setting up your account

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

Gmail Or other POP3

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Your First App Store Submission

Q. I use a MAC How do I change my password so I can send and receive my ?

BTC STUDENT GUIDE

Tour of Outlook Web App (OWA)

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

What is network security?

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

Lecture 9: Application of Cryptography

Office 365 Mail: Mac Mail OS X

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

Lukasz Pater CMMS Administrator and Developer

Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?

Secure in times of rising mobile communication

Pretty Good Privacy with GnuPG

Configuring Outlook to send mail via your Exchange mailbox using an alternative address

Grapevine Mail User Guide

Computer Security: Principles and Practice

App Distribution Guide

WebRTC-powered ICEWARP VERSION

Life after Microsoft Outlook Google Apps

An Introduction to Cryptography as Applied to the Smart Grid

Mac 101: dealing with icloud spam

Follow these steps to setup your Exchange ActiveSync account to your ios device:

New Features in Outlook Web Access

CS Computer Security Third topic: Crypto Support Sys

How to generate an APNs Certificate to use the Apple MDM protocol via the portal

Djigzo S/MIME setup guide

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin Using the Legal Vault

WatchDox for Mac User Guide

Mobile Iron User Guide

User Manual. [Outlook Web App 2013]

INTRODUCTION TO CRYPTOGRAPHY

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Configuration Guide to Hosted Exchange User Documentation for Customers & Resellers

ios Team Administration Guide (Legacy)

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

CS 758: Cryptography / Network Security

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Mobile Learning Apps. Distance Learning (860) Founders 131/131A Middlesex Community College

Transcription:

Getting the most from Apple Mail Larry Kerschberg, Roy Wagner, Jonathan Bernstein and Friends February 28, 2015 1

Topics Mail on Macs and ios devices Configuring your accounts IMAP Folders VIP Contacts, Conversations and Notifications Smart Mailboxes and Search How email flows through the Internet Secure email concepts with demonstration. 2

Mail on Mac and ios Devices Set up your email accounts using the Internet Accounts in the System Preferences (Mac) and in Mail, Contacts, Calendars in Settings (iphone/ipad). 3

Configure your accounts First you have to have set up your email accounts with each email provider; icloud mail, Google mail, Yahoo Mail, etc. You can view your account settings by accessing account info by right-clicking on the mailbox in the upper-left-hand corner of the main window. 4

IMAP (Internet Message Access Protocol) http://en.wikipedia.org/wiki/internet_message_access_protocol Most modern email services use IMAP; Multiple email clients Mac Mail, Web, ios can access messages stored on the server; IMAP allows you to define folders and to drag-and-drop messages into these folders; If you flag a message in a client, that flag will appear in another client. 5

Folders, Smart Mailboxes and Search You can create a folder in the sidebar and drag and drop messages into the folder. You can also define a Smart Mailbox by means of a rule and then all messages that satisfy the rule conditions will be placed in that smart mailbox. You can search the entire collection of mailboxes using the search box on the righthand-side of the main mail window. 6

VIP Contacts & Conversations You can assign a contact to be a VIP, and all messages from your VIP contact will appear in the VIP folder; You have the option of grouping all messages on the same subject as a conversation. 7

Notifications Both OS X Yosemite and ios 8 have notifications; In ios 8 you can turn on notifications on a particular thread to be notified when someone replies to an email message. 8

MailDrop for large file attachments In Yosemite, go to Mail preferences and for each account for which you want to use MailDrop, check off the: Send large attachments with Mail Drop. If an attachment exceeds the limit on the size of the email attachment, the file is stored in icloud Drive for 30 days for pickup. 9

Markup in Mail (Yosemite) Most of us know how to use Preview or other tools to annotate pictures or pdfs Mail in Yosemite allows such annotation on the fly after attaching a file to a new email message. After you attach a picture or pdf file to an email, either by drag and drop or using the Attach paper clip, it will appear as an icon in the message. But hover over the attachment and a pulldown lets you choose Markup. This opens the attachment with Preview s annotation tools, allowing on the fly annotations. This new feature is called Markup 10

How does email travel over the Internet? Alice Bob Alice s iphone IMAP HTTP Protocols icloud.com Servers Bob s Laptop SMTP Protocol Between Mail Servers IMAP HTTP Protocols google.com Servers 11

Security of email transmission over the Internet? Alice Bob Alice s iphone SECURE IMAP HTTP Protocols icloud.com Servers Bob s Laptop SECURE SMTP Protocol Between Mail Servers SECURE IMAP HTTP Protocols google.com Servers 12

Security of the messages themselves Our messages may be stored in the Internet Service Provider s servers (icloud, Google, Yahoo) as clear text ; We have to encrypt the messages in our email clients BEFORE we send them to the recipient. Then we will have end-to-end secure transmission of our messages. 13

Simple Encryption Scheme Substitution cipher: substituting one thing for another monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq Example: Plaintext: bob. i love you. alice Ciphertext: nkn. s gktc wky. mgsbc Key: The mapping from the set of 26 letters to the set of 26 letters. 14

How Modern Encryption Works Based on the work of Rivest, Shamir and Adleman (RSA) and Diffie and Helman; Use prime numbers to generate two keys: Public Key available to anyone to use to encrypt a message Private Key for you only to use to encrypt messages. Public Key Infrastructure Private Key is impossible to break! Public keys are stored in a public repository to access and use to encrypt. 15

Public Key Cryptography + Bob s public K B key - Bob s private K B key plaintext message, m encryption ciphertext algorithm + K (m) B decryption plaintext algorithm message + m = K B(K (m)) B From: Kurose/Ross, Computer Networks: A Top-Down Approach 16

Interesting Property of PKI The public and private keys are transposable You can encrypt with the public key and decrypt with the private key; or You can encrypt with the private key and decrypt with the public key. - + B B K (K (m)) = m = Use public key first, followed by private key + K (K (m)) B B Use private key first, followed by public key 17

PKI in use for email Digital Signatures You can use your private key to sign your message; you have digitally signed your message. The recipient of the digitally signed message can access your public key to verify that you are the sender, with the added assurance that only you could have sent the message. Why: Because only you have your private key which is literally impossible to crack. The message will still be sent as clear text, unless you encrypt it (see next slide.) 18

PKI in use for email Encrypting Messages You can use the recipient s public key to encrypt your message, with the added assurance that only the recipient will be able to decrypt the message. Why: Because he holds the private key of the key pair, so only he can read the original message. Furthermore, if the sender has digitally signed the message, the recipient will know that only the sender could have sent the message. So the transposable property of the key pair is very important. 19

Demonstration of Secure Email Use GPGTools: https://gpgtools.org Install the application, generate your key pairs using a strong password (store it in 1Password). Submit it to the Repository Configure your Mail.app preferences Begin signing email messages and sending encrypted email messages. 20

Mail.app GPG Plugin Preferences Quick Start Tutorial 21

GPG Keychain 22

Signed and Encrypted Mail Message 23

opengp for ios Read and send signed and encrypted email on your ios; Export your GPG Keychain (including secret key) to a file (.asc) Sync the file via app file sharing on itunes; 24

Screenshots of opengp 25

Conclusions We use email every day as part of our communication with family, friends and family; We have shown how to take advantage of the tools provided by Mail on OS X Yosemite and ios 8; icloud syncing of accounts, IMAP folders, VIP Contacts, Conversations, MailDrop, Smart Mailboxes, and Search. Learned how email messages flow over the Internet; PKI encryption can be used in Mail program to both sign messages and to encrypt messages. 26