It seems that you're using an outdated browser. Some things may not work as they should (or don't work at all).
We suggest you upgrade newer and better browser like: Chrome, Firefox, Internet Explorer or Opera

×
I've had no issues with Yahoo over the years, for a while i was going to quit yahoo, then my ISP went away and i sorta drifted to it. AOL isn't too bad either; Then again i use both at the bare minimum with all features turned off that i can get away with.

avatar
xxswatelitexx: Also Gmail ( and yahoo ) will be offering PGP encryption in email by next year - for those users who are joking about the NSA.
Sounds like a good thing... Used PGP/GPG before but never had anyone to use it with so i drifted to not using it.
avatar
rtcvb32: I've had no issues with Yahoo over the years, for a while i was going to quit yahoo, then my ISP went away and i sorta drifted to it. AOL isn't too bad either; Then again i use both at the bare minimum with all features turned off that i can get away with.

avatar
xxswatelitexx: Also Gmail ( and yahoo ) will be offering PGP encryption in email by next year - for those users who are joking about the NSA.
avatar
rtcvb32: Sounds like a good thing... Used PGP/GPG before but never had anyone to use it with so i drifted to not using it.
Ya it is not exactly what an average user would know how to use.
They are trying to dumb down the system enough so a normal user can utilize it without having to understand all the complexities of it.

There is still some setup involved mind you, but not as much as say trying to setup a Kelopatra GPG account.

If you want to give the new feature a shot early.
https://github.com/google/end-to-end

That is the Github of the plugin.
avatar
xxswatelitexx: They are trying to dumb down the system enough so a normal user can utilize it without having to understand all the complexities of it.
An upload for the public key which is attached to the email and transferred when requested... As for the private key, it should never touch the servers. So probably a downloadable app that you attach your private key to with a password, then it encodes the data as a text output. Pretty simple... Generating the keys should probably be left to programs already considered secure.
All the free mail service provider wants my phone number, as if I do not have enough of the apply for credit card phone call, and the you won XXX scam.
i'm using gmail, it is good if you want to use it for general things
avatar
Gnostic: All the free mail service provider wants my phone number, as if I do not have enough of the apply for credit card phone call, and the you won XXX scam.
i made 3 gmail accounts so far without adding my phone number, hmm...
Post edited October 15, 2015 by bela555
avatar
xxswatelitexx: They are trying to dumb down the system enough so a normal user can utilize it without having to understand all the complexities of it.
avatar
rtcvb32: An upload for the public key which is attached to the email and transferred when requested... As for the private key, it should never touch the servers. So probably a downloadable app that you attach your private key to with a password, then it encodes the data as a text output. Pretty simple... Generating the keys should probably be left to programs already considered secure.
Private keys are generally stored locally in the plugin - which creates a sort of local "keyring" app.
Personally if you don't have one - I recommend using Kelopatra.
http://gpg4win.org/download.html

avatar
Gnostic: All the free mail service provider wants my phone number, as if I do not have enough of the apply for credit card phone call, and the you won XXX scam.
Actually the reason they request phone numbers is
1. To prevent Spam bots from making accounts.
2. As a fail safe if your account is ever hacked - you can retrieve the account via an One time password via SMS to your phone.
avatar
xxswatelitexx: Private keys are generally stored locally in the plugin - which creates a sort of local "keyring" app.
Which is good... You don't want to have the private keys on the server; Since if the CIA/NSA bring a warrant for those keys, everything that's suppose to be protected won't be. But if the keys aren't present, they simply shrug their shoulders.


Although each email service might generate their own public/private key set for signing off headers ensuring they actually sent messages and lowering spam.
Post edited October 15, 2015 by rtcvb32
avatar
bela555: i'm using gmail, it is good if you want to use it for general things
avatar
Gnostic: All the free mail service provider wants my phone number, as if I do not have enough of the apply for credit card phone call, and the you won XXX scam.
avatar
bela555: i made 3 gmail accounts so far without adding my phone number, hmm...
How you do that?

Or you did it years ago before they force you to give phone number in order to create account?
avatar
xxswatelitexx: Private keys are generally stored locally in the plugin - which creates a sort of local "keyring" app.
avatar
rtcvb32: Which is good... You don't want to have the private keys on the server; Since if the CIA/NSA bring a warrant for those keys, everything that's suppose to be protected won't be. But if the keys aren't present, they simply shrug their shoulders.

Although each email service might generate their own public/private key set for signing off headers ensuring they actually sent messages and lowering spam.
Spam really wouldn't work - because you would need to have the users public key first to send the mail and you can only retrieve the public key by requesting it from said user.

So unless you willingly give your public key to a spam account - that shouldn't be an issue.
avatar
bela555: i'm using gmail, it is good if you want to use it for general things

i made 3 gmail accounts so far without adding my phone number, hmm...
avatar
Gnostic: How you do that?

Or you did it years ago before they force you to give phone number in order to create account?
I made the last one half year ago, i think if you are not using vpn or proxy it wont force you to add your phone number.
avatar
Gnostic: How you do that?

Or you did it years ago before they force you to give phone number in order to create account?
avatar
bela555: I made the last one half year ago, i think if you are not using vpn or proxy it wont force you to add your phone number.
Just tried just now. Don't work.
avatar
hedwards: I wouldn't personally recommend getting a gmail account as they're now letting marketers check their lists against Google's to mine the crap out of it.

Gmail wasn't so bad in the past, but over time it's gotten worse and worse.
avatar
Orion66: Well, that's not good. I don't want my p0rn perversions to be marketed;)
I have a Gmail account and my spam has in no way gone up over the past 3 years. Stop signing up for free porn DVD's sent to your door maybe.
avatar
bela555: I made the last one half year ago, i think if you are not using vpn or proxy it wont force you to add your phone number.
avatar
Gnostic: Just tried just now. Don't work.
Maybe it is works only from some countries.
avatar
xxswatelitexx: Spam really wouldn't work - because you would need to have the users public key first to send the mail and you can only retrieve the public key by requesting it from said user.

So unless you willingly give your public key to a spam account - that shouldn't be an issue.
Requesting a key may not be a problem, it may come as an attachment since the public key is public. But signing isn't quite the same as just encrypting. Spam is more interested in getting sheer numbers to an unsuspecting populous. Digital signing just ensures it came from said person, as long as the keyID matches. Although if a spammer is known to use public key xxx, then all keys signed with key xxx are automatically filtered out.

Then there's also with known public keys, Yahoo can detect it in the email, and decrypt the message and have a SIGNED button in green as an indicator making it seamless, as long as the key checks out.
avatar
xxswatelitexx: Spam really wouldn't work - because you would need to have the users public key first to send the mail and you can only retrieve the public key by requesting it from said user.

So unless you willingly give your public key to a spam account - that shouldn't be an issue.
avatar
rtcvb32: Requesting a key may not be a problem, it may come as an attachment since the public key is public. But signing isn't quite the same as just encrypting. Spam is more interested in getting sheer numbers to an unsuspecting populous. Digital signing just ensures it came from said person, as long as the keyID matches. Although if a spammer is known to use public key xxx, then all keys signed with key xxx are automatically filtered out.

Then there's also with known public keys, Yahoo can detect it in the email, and decrypt the message and have a SIGNED button in green as an indicator making it seamless, as long as the key checks out.
You seem to be mixing a few different concepts.
An authenticated document is not the same as an encrypted document.,

When it comes to Asynchronous encryption.
Every private key has a child key known as a public key.
That public key is unique to every individual.
The public key can only encrypt documents in every specific way that would allow only that specific private key to open.

The only way to view that document is using a specific private key to unencrypt it.

What you are thinking about is document authentication, which uses public certificates authenticated by a 3rd party which has been signed by a private key and authenticated by a public key.
Post edited October 15, 2015 by xxswatelitexx