© Carey Parker 2020
C. ParkerFirewalls Don't Stop Dragonshttps://doi.org/10.1007/978-1-4842-6189-7_8

8. Secure Communication

Carey Parker1 
(1)
North Carolina, NC, USA
 

Web surfing is all fine and good, but it’s a decidedly solo activity. When we need to communicate with others, we turn to other methods. Though the younger generation has embraced texting for person-to-person communications, email is still a popular method for communications in the world of work and for many people who grew up before the era of cell phones and SMS (short message service; the original and official name for “texting”). Instant messaging’s popularity has waned with the advent of smartphones, replaced by more mobile-oriented messenger apps. Let’s dig into these technologies a little deeper. To understand how to protect ourselves, we need to have a basic idea of how they work. Let’s start with email.

Email

When you visit a website with your web browser, you are creating a connection between your computer and a distant server such as your bank, an online retailer, or whatever. This connection may or may not be encrypted. If it is encrypted, then you can be sure that no one else will be able to peek at your messages.

With email, however, the complexity basically doubles. To send an email message, you first send the message to your email provider, and then your provider attempts to send the message to the recipient. This allows the service to “store and forward” the message. If the recipient is not immediately available (i.e., “online”), then the message can be saved for future transmission. Even if the recipient is currently available, the nature of the email system is to keep a copy of the message on the server until the user explicitly deletes it (see Figure 8-1).
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig1_HTML.jpg
Figure 8-1

Email communication within a single service

Note, however, that the recipient may use an entirely different email service. For example, if [email protected] sends an email to [email protected], then both Google and Yahoo will have copies of that message on their servers—one copy for Alice and another for Bob (see Figure 8-2). If Alice deletes her copy, Bob may still have his copy, or vice versa. (Of course, even if both Alice and Bob delete their copies of this message, Google and Yahoo may well still keep their copies on the server for some period of time.)
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig2_HTML.jpg
Figure 8-2

Email communication between two services

When we talked about encryption used for surfing the Web, all of the communications were point to point and short-lived. With email, the message is often encrypted only in transit (the arrows in the diagram). The messages themselves are rarely encrypted, meaning that anyone with access to the computers or servers could potentially read the emails. Emails are really more like postcards than sealed letters because anyone involved in transporting the message can read it. Also, while the connection between Alice and Google’s email server may be encrypted, she has no way to know or control whether the link between Google’s server and Yahoo’s server is encrypted or whether the link between Yahoo’s server and Bob’s computer is encrypted. In fact, until Snowden’s revelations, many of these server-to-server links were unencrypted.

So, what can we do about this? The best answer is to encrypt the email message itself, before it ever leaves Alice’s computer. Bob would then decrypt it when it arrives, and no one in between would be able to see the contents. Unfortunately, this is not easy for the average person to do, at least not yet. For many years, the tool used for encrypting emails is PGP, which stands for Pretty Good Privacy. (It’s actually excellent privacy, the inventor was just humble, I guess.1) The PGP process involves generating a public/private key pair using a passphrase, publishing these keys to one or more public key servers, and… I’ve already given up. Regular people will never do this. We need something that just works. It may have to be something entirely new, relegating email to an old technology you’ll tell your grandkids about. Email just wasn’t built for end-to-end encryption. Nevertheless, there are some viable options now, and I’ll tell you about them at the end of this chapter.

Text Messaging

Short message service (SMS), or texting , came around with the advent of mobile phones . It’s still the lowest common denominator today for mobile messaging—all cell phones and cellular service providers support this technology. Texting is similar to sending an email. It supports the store-and-forward function, meaning that the intended recipient doesn’t need to be online to get your message—you can send it whenever you want, and whenever they turn on their phone, the message will be delivered. Also, the phone companies have managed to work out the technical stuff to allow someone on Verizon to send text messages to someone using AT&T or T-Mobile. Apple has even integrated SMS with its instant message system (Messages or iMessage) so that you can use Apple’s proprietary system if all parties are using an Apple product (in which case the messages are blue) or fall back to regular text messaging otherwise (where message bubbles will be green).

Instant messaging (IM) has been around for about as long as email, believe it or not. They both date back to the early 1960s. IM is similar to email in terms of the communications pathways shown in the diagrams for email, but there are two main differences. First, there’s usually no store-and-forward ability. Second, instant messaging is mostly proprietary, so there is usually only one service provider involved. That is, if you’re using Google’s IM service, you generally can’t communicate with someone using Yahoo Messenger or AOL’s AIM service.

This is similar to the newer, mobile-oriented messenger apps: WhatsApp, Facebook Messenger, Telegram, WeChat, Discord, and so on. To chat with others, all users must have the same app installed. Unlike older instant messaging, most modern messenger apps will allow messages to be stored and forwarded if the intended recipient isn’t currently online.

Like email, text messages themselves are not typically encrypted from end to end, but instead are only encrypted in transit. They are often readable by the service you use to send the message. In the checklist, I’ll tell you about some truly private messaging services.

There’s a new kid on the block, too: Rich Communications Services (RCS), or known more commonly by its friendlier name, Chat. Communications standards groups have been working on this for a long time, recognizing that SMS is old and clunky. Chat will work across any type of phone or computer, unlike proprietary messaging apps like WhatsApp or Messages. It will support all the fun new features like read receipts, “typing” indicators, group chats, videos, and so on. Google announced support for Chat in 2019 and it’s slowly rolling out to Android phones, once the cellular carriers support it. Apple has been mum so far, officially, on supporting RCS, but my guess is they will eventually cave in to reality. However, RCS is lacking one crucial feature that I can’t believe they left out: end-to-end encryption. So while this will make iPhone-to-Android chats prettier, it still won’t be truly private.

Spam and Spoofed Messages

Junk emails and messages—usually unsolicited advertisements—are referred to generally as spam . Many of our most-used messaging platforms are open by default. That is, if you know someone’s email address, messaging handle, or cell number, you can send them a message—no permission required. Some messaging systems have implemented a check mechanism whereby you have to first allow the other person to “follow” or “friend” you before they can send you a message; however, this support isn’t ubiquitous.

If you’re lucky, the spammers will only send you advertisements. However, spam is also a favored delivery mechanism for malware—either with links to bad websites or with malicious code embedded in attachments. These links and attachments can be sent using email, text messages, and messenger apps.

It’s important to realize that it’s easy for the sender of a message to be spoofed. That is, just because the “from” on the email or text message is someone or some company you know and trust, you can’t assume that it’s really coming from them. Also, email accounts are often hacked, so even if a message truly is from where it says it’s from, you still have to be very wary of any links or attachments given to you. While antivirus and other safety utilities do an okay job of blocking these things, you can’t assume that they are 100 percent effective.

You also need to realize that you can’t trust the text of a link. Just because the link says http://google.com doesn’t mean that that’s really what the link is pointing to. Sometimes if you hover your mouse pointer over the link, your browser or email app will show you the actual link. In fact, if you’re reading the eBook copy of this book on your computer and you hover over that link, you’ll see that it’s actually fake (Figure 8-3).
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig3_HTML.jpg
Figure 8-3

Misleading web links in text

Sometimes the bad guys will try to trick you with websites that are slightly misspelled, often in a way that is hard to catch like out1ook.com or tvvitter.com.

It gets worse. There’s a web technology called Punycode that allows for encoding all sorts of fancy foreign character sets, which is nice. But some of these non-English characters look just like their English counterparts. Bad guys can register web domain names using these characters, and you won’t be able to tell the difference no matter how closely you look. Check the example in Figure 8-4.
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig4_HTML.jpg
Figure 8-4

Example of Punycode misleading web address

The top value is what you would normally see, but the unencoded version (the real website) is what you see at the bottom. While this appears to be the English alphabet characters a-p-p-l-e, the web address here is actually using characters from the Cyrillic alphabet that happen to look just like a-p-p-l-e in the font used by Chrome and Firefox browsers.

Thankfully, web browser password manager plugins like LastPass will not be fooled by either of these tricks. If you go to a website that should be familiar but LastPass isn’t offering to fill in your username and password, then you might not be looking at the website you think you are.

Many web links today just immediately redirect you to another website, so you can’t be certain that what you see is what you’ll get. There are link-shortening services that will take long, obnoxious web addresses and shorten them to something much easier to type and/or remember. These services perform a redirect from the short link to the real destination. So, for many reasons, you simply cannot judge a link by its text.

Finally, some images and links that come in emails can be used to track your movements on the Web and will also help spammers to mark you as a viable target. This is why many email clients will refuse to load the images contained in an email until you say it’s okay. For example, a spammer may get a list of a million email addresses from someone who hacked into some databases. The spammer has no way of knowing whether all of these addresses are still active. They will also not know if a particular email was able to get through all the various spam filters that are between them and the recipient. But if they put an image in that email with a unique identifier and your email client downloads that image from the bad guy’s server, then they will immediately know that the email address works and that it got through to you…in which case you should expect to receive more junk mail. (Legitimate marketers use this technique, too.)

Many solutions have been proposed for stopping spam, but because the Internet is so driven by marketing and advertising, the key players have been loath to adopt them. It comes down to this: who gets to determine what’s junk? We’ve had the same struggle with regular junk mail delivered by the postal service. The postal office makes a lot of money delivering those ad flyers to you. However, the risks of malware I believe will eventually drive the industry to offer some sort of solution.

One option would be to charge a small amount of money to transmit more than, say, 100 emails in a 1-hour period or maybe 500 per day—something that would not affect most people but would cause spammers some grief. Right now, email is essentially free, which leaves it open for abuse. The problem here is that this could hurt small, legitimate businesses and still allow massive, wealthy corporations to continue sending gobs of unwanted emails.

There are several technical solutions2 that have been proposed to this problem. They are extensions to the existing email technologies to allow for authenticating email senders. But this doesn’t stop spam, it just makes it harder for the sender to hide their identity. For various reasons, these technical solutions have yet to be adopted widely.

The most draconian option would probably be moving to a whitelist system where you cannot send email to someone unless they first approve you as a sender. This could be automated to a certain degree. When you first email someone, you will get a canned response from the service provider saying something like “I only accept email from people I know. Please contact me by some other mechanism first or answer these few questions to prove you know me.” Spammers deal with millions of emails, so they wouldn’t have time to bother with this. This would still allow legitimate companies with which you actually have some relationship to contact you. The process of registering on their website could automatically add them to your whitelist of approved senders. My gut tells me that this is where we’ll end up, unless we come up with a completely new scheme for sending electronic messages.

Until then, we have limited methods of dealing with junk messages. We’ll cover those in the checklist.

How to Recognize a Fake Email

You should learn to recognize the hallmarks of a fake email. These are used in “phishing” scams to trick you into giving up sensitive information like Social Security numbers, account information, or login credentials. These emails will very often play on your emotions to get you to bite: fear, anxiety, even charity. Common ploys include
  • Problems with your account or your computer

  • Fake invoices or shipping notices

  • Fraudulent IRS or Social Security warnings

  • Winning a contest you never entered

  • Extortion emails claiming to know all about you

  • COVID-19 cures, health warnings, symptom checklists, and so on

In most cases, the emails will purport to be from a very official source. The email may actually look valid, though often if you look at the actual reply-to address carefully, you’ll see that it’s fake. Instead of “apple.com” it be “myappleid.com” or “apple.something.com”. But realize that it’s not that difficult to fake a reply-to address.

Similarly, if the email includes links or buttons/images that are clickable, you can inspect the link destination usually by hovering your mouse over it. While you should never click these links, you can use this technique to see if it’s “phishy.”

Next, look for grammar and spelling errors. Reputable organizations and companies will not make simple mistakes like these—certainly not several of them in one email.

If the email is supposedly from a company or organization with which you have an established relationship, they should address you by name. A general salutation from your bank or the government like “Dear customer” or even “Dear sir” should be a red flag. If the email is in reference to an account, they should include a partial account number.

No reputable company should ever ask you to send them a password or credit card number or other personal info via email.

The extortion email is a particularly nasty version of email scam. A common technique is to send you one of your old passwords and then claim that they’ve hacked your computer and know all about you. They’ve turned on your webcam and taken compromising pictures or video of you. They’ve stolen sensitive files from your computer or smartphone. If you don’t pay them money, usually in Bitcoin, they threaten to email this stuff to all your friends and family, or something similar.

The hook here is the old password—it probably is (or was) one of your passwords. How could they possibly know that?? Chances are good that some account of yours was involved in a data breach and the bad guys were able to crack your password (probably because it was a crappy password). These passwords are then sold on the “dark web” in bulk-like batches of thousands or even millions. So, if this password is still in use by you on any online account, you should change it immediately. But you can stop worrying about the extortion email—it’s all a lie.

The safest thing to do with a scam email is to just delete it. If you’re worried that it might be real, contact the company/organization directly. Go to their website or log in to your online account by manually typing in the website address. Or just call them. You’ll find more help in the checklist at the end of this chapter.

“So How Do I Communicate Securely?”

Most of the time, you will probably be satisfied knowing that your emails and text messages are encrypted in transit, even if the message itself is not. You’ll need to realize that your email and messaging service providers are almost surely scanning your messages so they can improve their marketing profiles on you. Most of this is automated (it’s not a human reading your stuff), but nevertheless, you’re trading your privacy to use these free services. They may also be selling this information to data mining companies, who will package this up with other information about you and sell to others. It’s an amazing economy that most people never see or hear about.

But there will come a time when something you want to send needs to be really private. Maybe you’re discussing something deeply personal, or maybe you’re just trying to send financial information to your tax preparer. Remember that copies of whatever you send will likely remain on the servers of your messaging provider, possibly even after both you and the recipient delete the messages.

So, how can you do this? You have at least two options (and to be super secure, you can do them both simultaneously). We’re talking about data at rest vs. data in motion, that is, encrypting the content of the message vs. encrypting the channel that the data will pass through. Think about it this way. You can put your money in a safe—that’s security at rest. If you want to then send that money across town, you could hire an armored car—that’s security in motion. If you want to be really secure, you would have the armored car transport the money in the safe—that’s using both mechanisms at once. If someone hijacks the armored car or follows it to its destination, they’d still have to break into the safe to get the money.

Let’s talk first about securing your messages as they traverse the Internet. As we’ve said, most modern messaging systems will encrypt your message as it travels but will not encrypt the message itself. There are some notable exceptions that offer end-to-end encryption . That is, the message contents are actually encrypted at the sender’s device and are capable of being decrypted only by the recipient’s device. These systems use a form of asymmetric encryption like we discussed earlier in the book—using a public key to encrypt the message and a private key to decrypt it. Apple’s Messages service offers full end-to-end encryption, as do the Telegram and WhatsApp messenger apps.3 There are secure email services, as well, including a wonderful service called ProtonMail. Unfortunately, in all of these cases, you’ll need your intended recipient to use the same service for it to work smoothly (or even at all).

One way around this is to separately encrypt the contents of your message, and then you can theoretically send it using any communications mechanism you want. This would be like driving your safe full of money across town in the back of your pickup truck. Everyone can see the safe—and may well assume that it contains something valuable—but the contents are perfectly secure, assuming you bought a decent safe.

So, how does one go about encrypting a message or a file? The simplest way is to “zip” the file or files using a special application. These utilities are usually used to shrink the size of a file and/or bundle several files together into a single file. You select the file or files and tell the utility to compress them, resulting in a single output file that should be smaller than the original(s). In fact, the most common such utility creates a file ending in .zip.

But these zip utilities also often have the option of adding a password to the bundle, meaning that the recipient won’t be able to unzip the file without knowing the password. Adding the password encrypts the entire bundle.

If what you’re sending could be sent as a Portable Document Format (PDF) file, you can also usually create PDF files with passwords. So, if you’re sending a single file, you could export that file to PDF format and add a password to that file. (This may require opening “advanced” options when exporting the file.)

Of course, if you have the option, you could combine both techniques: encrypt the contents and send them using an encrypted communications mechanism. But at a bare minimum, you need to encrypt the contents itself. Remember that whatever you send could be saved on a server somewhere for a very long time, possibly unencrypted, just waiting to be found. Encrypting the file is more important than sending the file using an encrypted communications channel.

Note

When sending a password-protected (encrypted) file, you must find a way to securely communicate the password to the recipient. Specifically, you can’t just send the password using the same mechanism that you used to send the file. For example, if I were to email my tax docs to my CPA in a password-protected zip file, I should not then send him the password in another email. I should either call him on the phone and tell him the password or send the password using a secure messenger application.

Summary

  • Email and text messaging add a new dimension to the problem of secure communications. Instead of just having to secure a single channel between you and a web server (as with web surfing), you also need to secure the channel from the server to the intended recipient—and perhaps between your service provider’s server and their service provider’s server. That is, communication between two or more people is almost never point to point—there could be other “legs” along the way that are not secure.

  • Furthermore, even if all of these separate channels are encrypted, the messages themselves are almost surely not, meaning that the servers between you and the intended recipient will have copies of your messages that they can read whenever they like. Those copies can remain long after you and the recipient delete them.

  • We have to be careful when clicking links and opening attachments we receive, even if they appear to be from someone we know and trust. Email in particular can be used to send dangerous, malware-laden files or links to websites that will attempt to infect your computer or trick you into giving up private information.

  • If we want truly secure and private communications, we need to encrypt the message itself as well as the channel by which it’s sent.

Checklist

Tip 8-1. Create Email Accounts for Public and Private Uses

Email accounts are free and easy to create. Having one email address for people you actually care about and another “throwaway” address for retailers, web forums, contests, and so on will at least allow you to quickly segregate important emails from ones that can wait (possibly forever). If your current email account is already swamped with junk, you should consider creating a new email address that you will give out only to friends and family.

While Gmail, Yahoo, and Outlook are free and easy to use, you might want to seriously consider using a for-pay service to better protect your privacy. Fastmail is an excellent option. Because Fastmail also has the ability to create secondary accounts (“aliases”), you can actually use this one service for both your public and private email addresses.

Tip 8-2. Use an Encrypted Email Service

The desire for truly private email communications is definitely increasing as we learn more and more about mass surveillance and hackers liberating embarrassing conversations from poorly secured servers. The marketplace has responded with new offerings that provide true end-to-end encryption.

One such service that was launched in early 2016 is ProtonMail. I use this one myself. There is a free tier of service, so you can try it without paying a dime. For truly end-to-end encrypted emails, you’ll want the recipient to have a ProtonMail account, as well. There are options for sending encrypted messages to other email services, though—they will receive a link instead of a message and will have to click the link to view the message. This is the problem with secure email today—it requires a lot of coordination.

Some other options to consider are Tutanota, Mailbox.org, and Posteo. Some of these services also offer secure contacts, calendars, and online doc collaboration.

Tip 8-3. Send Sensitive Info Securely

You should never send sensitive or highly personal information via email or text message. Again, most of these messages should be thought of as postcards, not sealed envelopes. And copies of these messages may remain on servers long after you and the recipient delete the message. Sensitive info would include Social Security numbers, credit card numbers, passwords, medical or financial data, and anything else that you wouldn’t want someone else to see.

Regardless of how you plan to send this information, you should take the precaution of encrypting the data before you send it. This means somehow locking that data with a password. The gold standard for this is a system called Pretty Good Privacy (PGP), but it’s hard to set up. An easier and more universally accessible method is to create a password-protected zip file. While you will need some special tools to create this encrypted zip file, your recipient should be able to open this file without needing a special application. (Even if they do, the applications are free and easy to use.)

Your first step is to pick your password. Since this is something you’ll need to be able to communicate to someone else (your recipient will need this to open the file), consider how you will send it. You can’t use the same mechanism for sending the zip file and sending the password. Will you have to call them on the phone? Can you send them a secure text message? Will they be able to copy and paste it, or will they have to type it by hand? You want something they can handle without too much trouble, but it can’t be easy to guess. Once you have your password, proceed with the following steps to create your file.

Once you’ve created your file, you can send it via email. You might also use a cloud storage service like Dropbox, which allows you to create a “share link”—a unique download link. Once the file has been downloaded by the recipient, you should remove the file from your cloud service (or at least disable the share link).

If this whole process is too complicated, you might try the next tip. Or better yet, use it in combination with the next tip.

Tip 8-3a. Windows

The default zip function build into Windows, particularly older Windows versions, is not very secure. The best, free zip utility for Windows is called 7-Zip.
  1. 1.

    Download and install 7-Zip (you probably want the 64-bit version unless you have a very old computer): www.7-zip.org.

     
  2. 2.

    Put all of the files you want to encrypt into a single folder, say “my secret stuff.” Then right-click this folder and select 7-Zip ➤ Add to archive (Figure 8-5).

     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig5_HTML.jpg
Figure 8-5

7-Zip archive creation

  1. 3.
    Don’t let all the options scare you. In the window that pops up (Figure 8-6), you only have to check three things.
    1. a.

      Set “Archive format” to 7z (upper left).

       
    2. b.

      Set “Encryption method” to AES-256 (lower right).

       
    3. c.

      Enter your chosen password.

       
     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig6_HTML.jpg
Figure 8-6

7-Zip password-protected archive settings

  1. 4.

    Click OK to create your password-protected file (it will end in .7z).

     

Send this file to your recipient. If they have trouble opening it, have them download 7-Zip (Windows) or Keka (Mac).

Tip 8-3b. Mac OS

  1. 1.

    Download and install Keka. Ideally, you would do this via the Mac App Store ($2.99). But you can also find it on the developer website for free:

    https://www.kekaosx.com/en

     
  2. 2.

    Keka is handy but a little odd to work with. Launch Keka, and from the Keka menu, open Preferences (Figure 8-7). Select the “Use AES-256” option.

     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig7_HTML.jpg
Figure 8-7

Mac Keka compression preferences

  1. 3.

    Now, in the main Keka window, select “7Z” option at the upper right, if not already selected (Figure 8-8). Fill in your chosen password. I usually also select “Exclude Mac resource forks” (harmless and invisible to Mac users but confusing for Windows users).

     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig8_HTML.jpg
Figure 8-8

Keka password-protected archive settings

  1. 4.
    Put all of your files into a single folder, say “my secret stuff.” Drag that folder on top of the Keka window and it will change (like Figure 8-9).
    ../images/466102_4_En_8_Chapter/466102_4_En_8_Fig9_HTML.jpg
    Figure 8-9

    Keka creating an encrypted archive

     
  1. 5.

    When you drop the folder on Keka, you will be presented with a save dialog. Choose where you want your 7-Zip file to be saved. You can change the name of the file, if you wish (Figure 8-10).

     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig10_HTML.jpg
Figure 8-10

Keka file save dialog

  1. 6.

    Send this file to your recipient. If they have trouble opening it, have them download 7-Zip (Windows) or Keka (Mac).

     

Tip 8-4. Send Files Securely Using the Web

All that encryption stuff can be a real pain in the butt. We have to just build this stuff into everything so that it’s the default. But there’s one other option you might want to consider if the previous tip was too hard for you. It’s a free web transfer service from the good people at Firefox4 (though it can be used with any browser).
  1. 1.

    Go to https://send.firefox.com. Simply drop your file(s) onto the web page to upload the file securely (Figure 8-11).

     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig11_HTML.jpg
Figure 8-11

Firefox send drag and drop window

  1. 2.

    Enter your password. (If you don’t use a password, anyone with this link can download and read your file.) You can also set the file share offer to expire after a certain number of downloads or a certain amount of time (whichever happens first). The defaults are usually good. The person you’re sending this to should be expecting it and be ready to download it (Figure 8-12).

     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig12_HTML.jpg
Figure 8-12

Firefox send password and expiration settings

  1. 3.

    Click the “Upload” button. This will result in a unique web link that you can send to your intended recipient for secure downloading (Figure 8-13). Simply click the “Copy link” button and then paste this link in an email or text message.

     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig13_HTML.jpg
Figure 8-13

Firefox send secure download link

  1. 4.

    Then click “OK”. The file will be available for the number of downloads or days you specified. You can also delete the file manually using the “X” to the right of the file name on this page (Figure 8-14).

     
../images/466102_4_En_8_Chapter/466102_4_En_8_Fig14_HTML.jpg
Figure 8-14

Firefox send file sent

Tip 8-5. Read Your Email Using the Web

While email applications like Windows Mail and Apple Mail have some really handy features, sometimes it’s better to use the web-based email client. Many web email clients are quite good actually, including some features you can’t even get on a more traditional application you would run under Windows or Mac OS. If you’ve received a sketchy-looking email, using the web client to read it can provide another layer of safety. Most popular web email clients have built-in virus and link scanners. These clients also have much more limited access to your local files and operating system—they’re “sandboxed” to help contain bad things within your browser.

The one downside to strictly using a web-based email client is that you don’t have a local (downloaded) copy of all your emails. If your email provider is inaccessible for any reason, you won’t have access to any older emails. So I generally recommend that you use a regular mail application periodically, which will download your messages locally for offline access and backup. Examples of this would be the Mail applications that come built in to Mac OS and Windows 10.

Tip 8-6. Don’t Abandon Unused Email Accounts

Over the years, you may have accumulated several email accounts. Sometimes your ISP will create an automatic email address for you, for example. Or perhaps you had to set up an email account for some special occasion and now have no need of it. If you never check it, you may never realize that it has been taken over by spammers or other ne’er-do-wells. I recommend checking in on your old accounts from time to time. Look in the Sent folder and make sure it hasn’t been hijacked. (If so, see Chapter 12 for dealing with a hacked email account.)

If you don’t plan to use the account anymore, you have two options. If this account was rarely used, I would delete all email in all folders, clear out any saved contacts, and then contact the email provider on how to delete your account.

If you want to delete an account that you’ve used a lot and is well known to your friends and family, I would instead consider just leaving it alone. Email providers will sometimes recycle old email addresses, meaning that someone else could end up with your address (like someone else getting your old phone number). This can lead to confusion and could even be abused. So, you might delete all the emails and contacts and then just check it from time to time to keep it active (from the perspective of your email provider). Make sure this account has a strong, unique password, too.

If you’ve forgotten the password, you can usually find a “forgot my password” link that will send a reset email to whatever your backup email account was for that account. (I know…it’s a vicious cycle, right? Do you have access to that account?)

Tip 8-7. Keep an Eye on Your Account Activity Info

Many email providers will alert you if they detect suspicious activity on your account. This often means accessing your account from unusual locations. (Remember, each computer has a unique IP address, and this address can be used to find your general location on the planet.) Every so often, you might take a peek at your recent activity to look for this yourself, especially if you have some reason to believe your email account may have been hacked. Here are links to three of the most common email account services. However, you can probably find similar “activity” information under your profile/account settings for most services.

Google:
  1. 1.

    You can check for any Google security notifications by going to this link:

    https://myaccount.google.com/notifications

     
  2. 2.

    Sign in (if necessary) to view any security notifications.

     
Outlook.com:
  1. 1.
     
  2. 2.

    Sign in to view your activity.

     
Yahoo:
  1. 1.
     
  2. 2.

    Click “Recent activity.”

     

Tip 8-8. Don’t Forward Something Without Verifying It First

We’ve all gotten those emails about dying children wanting to get emails from around the world or Disney giving away free passes or urgent COVID-19 health information. There are many hoaxes and “fake news” out there that sound very real. Do your part by verifying anything before sending it to all your friends and family.

How do you do that? You can always just search the Web using a key phrase from your email (maybe the subject) plus the word hoax. Or you can just go to snopes.com, whose whole purpose is to document these chain letter claims (as well as common urban legends). Some of them are even true. They do the homework for you.

www.snopes.com

Tip 8-9. Don’t Click Links, If Possible

Links can be faked or tweaked ever so slightly so that a human might not notice. For example, out1ook.com instead of outlook.com or tvvitter.com instead of twitter.com… did you catch the difference? It may depend on the font you’re using to view this book. It gets even worse, though. There’s a web standard called Punycode that allows the creation of web addresses using all sorts of foreign language characters that often look just like their standard English keyboard counterparts.

Whenever possible, leave the email be and go straight to the source in your web browser. For example, if you get a suspicious email from your bank that says “click here to verify your account,” just log in to your bank directly and check your account for any notices (or call them). Note that it doesn’t really matter if the email comes from someone or some company you trust—the sender can be forged, or their account could have been compromised.

The main rule here is: don’t click any links that you didn’t ask for. For example, if you just reset your password, then you would expect an email shortly thereafter with a link to click.

If you’re worried about a link or button that you really need to click, you can try testing it on this website first. Right-click the web address link and copy it, then paste it on this website:

https://www.virustotal.com/gui/home/url

Tip 8-10. Don’t Open Email Attachments, If Possible

While images are usually safe, things like Microsoft Office documents (Word, Excel, and PowerPoint files), PDF files, or compressed files (like zip files) should be avoided—or any file with an extension you don’t recognize. At work, follow whatever policies your company specifies. You can’t get very far if you don’t trust email from your coworkers. But at home, you should be very wary about opening any attachment that you didn’t explicitly ask for. If you’re not sure, contact the sender first (via phone or some other means) to make sure they did actually send it.

Tip 8-11. Check Files Before Sending

As a matter of Internet hygiene, you should consider scanning files before you send them on to someone else (particularly if you aren’t the original creator of the file). If you don’t have an antivirus program installed (or if you just want to be super sure), there’s a great website that will scan a file for viruses using several tools. Of course, be aware of privacy issues here. While this site is trustworthy, your company might not like it if you were to upload proprietary information (and you probably already have antivirus on your work computer that is checking all your files).

https://www.virustotal.com/gui/home/upload

Tip 8-12. Deal Properly with Spam

If you get an email that you’re pretty sure is junk, don’t even open it, and certainly don’t reply to it. You don’t want the sender to know your email address is active and valid. Don’t try to “unsubscribe,” unless you’re sure the sender is reputable. If your email application has the option to mark the message as junk or spam, do that—it will help them to filter these messages out in the future (not just for you, but for others, as well). If there is no such option, just delete the message. If the sender is a company you have an account with, then log in to your account and find your email preferences. You should be able to turn off (or at least reduce) their emails there.

Tip 8-13. Use Secure Messaging Apps

Most text messaging today is not very secure. The messages might be protected en route but not at the various servers in between—that is, segments of the path are protected, but it’s not encrypted end to end. The following apps are end-to-end encrypted and will work on your computer as well as on your mobile devices.

The clear choice from just about every expert I know is called Signal, by Open Whisper Systems. These guys are crazy smart and completely dedicated to providing a free, super-secure messaging service. They have also added audio and video calling capability (also fully encrypted). The app is available for Mac, Windows, iOS (iPhone), and Android.

https://signal.org

You’ll have to sign up for a Signal account and create a PIN code for added security. Be sure to save this code in LastPass!

Signal accounts have traditionally been based on your cell phone number. Signal is promising to provide a more anonymous method for creating an account and this may be available by the time this book publishes. One benefit to using your cell phone number is that anyone else who knows your cell number can easily find you on Signal.

Note that whoever you’re communicating with will also need to install Signal. This can be a barrier because people are sick of installing yet another messaging application. But you can convince them that this should be the last one! Seriously, though, if no one uses these secure applications, then existing, less-secure services will never get the message (no pun intended) that people care enough about privacy to expend some effort.

Tip 8-14. Secure Your Video Chats

In the age of the coronavirus, we’ve all been introduced to the concept of multiparty video chats. The company Zoom became a household word overnight, though there are many such services out there: Webex, Skype, FaceTime, Google Hangouts, Facebook Video Chat, and more.

While many of those are secure and private enough, you might at least consider stepping it up a notch. The simplest secure option is probably one you’ve never heard of: Jitsi. It’s free, the software is open source, and it’s end-to-end encrypted. It honestly works a lot like Zoom—all participants need is a meeting link and a web browser. Check it out:

https://jitsi.org

Of course, you can also use Signal, though it would require all parties to have an account. But honestly, for what most people need, most of these services are secure and private enough. (Zoom, in particular, has really stepped up its game after some initial missteps.)

Some general tips for doing a group video chat:
  • Use a password for the meeting, and don’t send the password along with the meeting link (it defeats the purpose). Send the password via another communication mechanism.

  • Don’t use a static meeting link—use a new, random meeting ID each time. And don’t share the meeting link on social media or any other public forum.

  • If the service has a “lobby” or “waiting room” option, this will allow you to explicitly admit each party (and weed out any unwanted crashers).

  • If you’re doing a large meeting with some people you don’t know, restrict access to things like screen sharing, chat functions, and even the ability to rename yourself. These can all be used to harass or embarrass your group.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.178.234