Email Encryption: What Are You Waiting For? - Conclusion
(Page 4 of 4 )
As I conclude this article, I will be harking back to some of the things I previously mentioned. First of all, you might be asking yourself, "Why don't hosting companies just offer encryption to their users?" This leads us back to government involvement. The company has to examine whether it's worth the opprobrium from clients if they were to refuse encryption and allow government surveillance. On the other hand, are they willing to take on the wrath of the government?
Really there are two main options that I can see: either not offer encryption at all so that it need not be dealt with or allow the users to decide their own fate and place all of the blame on them. Look at it this way, the government has done so much for corporations in the past, but then again how can a business function without a steady flow of clientèle? I know I mentioned a classic novel earlier in this piece, but talk about a Catch-22!
What does seem to be clear cut is that encryption is the wave of the present. Anyone who puts any value on privacy whatsoever should definitely look into it. There are countless encryption service offerings and a lot of them are free, so the question is "why not encrypt?" Most people probably think that they're in the clear in terms of government spying, but I guarantee the government isn't the only one watching. Chances are you've probably downloaded a song or two illegally and you know there are people actively trying to crack down on that. I know this has nothing to do with email; I'm just trying to make a point.
I'd like to thank you for reading this article. At this point there's not much more I can say. So for Pete's sake, encrypt your email! If anything, once you do, you can tell all your friends you helped stick it to the man. And isn't that what life's all about?
| DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |