Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] Data including email, stored in the cloud, may be available to law enforcement without search warrant



On Thu, Nov 3, 2011 at 1:07 PM, Daniel C. <dcrookston at gmail.com> wrote:
> On Thu, Nov 3, 2011 at 11:06 AM, ?<markw at mohawksoft.com> wrote:
>>> This is a problem that can be easily solved by using end-to-end
>>> encryption. The capability is already built-in to every common email
>>> client.
>>
>> Assuming your ISP allows encryption to a server on your premises. Most
>> email servers are outside of your premises and thus in the custody of a
>> "provider." The problem is that there is no 4th amendment protection for
>> your data in the custody of a vendor. They can be ordered to hand over
>> your data, unencrypted, by any number of government agencies.
>
> I'm not sure what you're saying. ?Email clients can encrypt and
> decrypt - there's no need to rely on the provider to do any work, and
> you don't need an email server at your home to encrypt an email before
> you send it, or decrypt after it's received.
>
> -Dan

I suspect he's talking about transport encryption (SSL/TLS) while
you're talking about message encryption (PGP/GPG)



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org