Discussion:
..:.. PGP ANONYMOUS PGP EMAIL PGP ANONYMOUS PGP ..:..
(too old to reply)
Nomen Nescio
2011-06-04 19:05:57 UTC
Permalink
Raw Message
Ever wanted to send an anonymous email but don't know how?

Well, here's a tutorial...

http://anonymous-remailing.blogspot.com/

If you don't need to send anonymous email then there is still a link
to download PGP freeware software.

This PGP software can encrypt files on your computer using keys or
passphrases. Always a handy program no one should be without!

--

ANONYMOUS EMAIL ANONYMOUS EMAIL ANONYMOUS EMAIL ANONYMOUS EMAIL
ANONYMOUS EMAIL ANONYMOUS EMAIL ANONYMOUS EMAIL ANONYMOUS EMAIL
ANONYMOUS EMAIL ANONYMOUS EMAIL ANONYMOUS EMAIL ANONYMOUS EMAIL
PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP
PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP
PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP PGP

USENET USENET USENET USENET USENET USENET USENET

--
Phil Stovell
2011-06-05 03:18:24 UTC
Permalink
Raw Message
Post by Nomen Nescio
This PGP software can encrypt files on your computer using keys or
passphrases. Always a handy program no one should be without!
Truecrypt is better for that.
Bilbo Warble
2011-06-05 09:17:54 UTC
Permalink
Raw Message
Post by Phil Stovell
Post by Nomen Nescio
This PGP software can encrypt files on your computer using keys or
passphrases. Always a handy program no one should be without!
Truecrypt is better for that.
Truecrypt, although a very good product for personal use (it can be used
in a commercial environment but lacks the management features of a
commercial product), does not encrypt individual files - it creates an
encrypted container for storing files inside.
Phil Stovell
2011-06-05 09:54:10 UTC
Permalink
Raw Message
Post by Bilbo Warble
Post by Phil Stovell
Post by Nomen Nescio
This PGP software can encrypt files on your computer using keys or
passphrases. Always a handy program no one should be without!
Truecrypt is better for that.
Truecrypt, although a very good product for personal use (it can be used
in a commercial environment but lacks the management features of a
commercial product), does not encrypt individual files - it creates an
encrypted container for storing files inside.
Where you can save your files GPG/PGP-encrypted if you must. TC also
includes plausible deniability, which GPG/PGP doesn't.
Bilbo Warble
2011-06-05 10:35:30 UTC
Permalink
Raw Message
Post by Phil Stovell
Post by Bilbo Warble
Post by Phil Stovell
Post by Nomen Nescio
This PGP software can encrypt files on your computer using keys or
passphrases. Always a handy program no one should be without!
Truecrypt is better for that.
Truecrypt, although a very good product for personal use (it can be used
in a commercial environment but lacks the management features of a
commercial product), does not encrypt individual files - it creates an
encrypted container for storing files inside.
Where you can save your files GPG/PGP-encrypted if you must. TC also
includes plausible deniability, which GPG/PGP doesn't.
My point is, that you are comparing dissimilar products. Truecrypt
provides an encrypted container, which does not lend itself to the
transmission of single encrypted file in the way that PGP/GPG does.

Don't get me started on the 'plausible deniability' aspect of Truecrypt
- unless you are incredibly careful, there will be pointers to the fact
that you are using this facility, as widely discussed on the Truecrypt
forum.
Phil Stovell
2011-06-05 11:17:24 UTC
Permalink
Raw Message
Post by Bilbo Warble
My point is, that you are comparing dissimilar products. Truecrypt
provides an encrypted container, which does not lend itself to the
transmission of single encrypted file in the way that PGP/GPG does.
Yes, I frequently send emails using passworded GPG'd files.
Post by Bilbo Warble
Don't get me started on the 'plausible deniability' aspect of Truecrypt -
unless you are incredibly careful, there will be pointers to the fact that
you are using this facility, as widely discussed on the Truecrypt forum.
Indeed. You need to be careful that the files you access in the hidden
container have innocuous duplicates in the outer.

Loading...