{"id":13894,"date":"2018-11-22T04:30:11","date_gmt":"2018-11-22T12:30:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/11\/22\/news-7661\/"},"modified":"2018-11-22T04:30:11","modified_gmt":"2018-11-22T12:30:11","slug":"news-7661","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/22\/news-7661\/","title":{"rendered":"Gmail encryption: Everything you need to know"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/11\/gmail-encryption-100780877-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Thu, 22 Nov 2018 04:00:00 -0800<\/strong><\/p>\n<p>Encryption may sound like a subject best left to hackers and tinfoil hat wearers, but don&#8217;t be fooled: It&#8217;s a critical part of contemporary life and something that&#8217;s important for everyone, especially business users, to understand. And one of the places where encryption is most relevant <em>and<\/em>\u00a0misunderstood is in the realm of email.<\/p>\n<p>If you&#8217;re using Gmail for electronic communication \u2014 be it for business, for personal use, or a combination of the two \u2014 it&#8217;s well worth your while to know how the service does and doesn&#8217;t secure your information and what steps you can take to make sure you&#8217;re getting the level of privacy you need.<\/p>\n<p>Ready to dive in?<\/p>\n<p>Google&#8217;s standard method of Gmail encryption is something called TLS, or Transport Layer Security. As long as the person with whom you&#8217;re emailing is also using a mail service that also supports TLS \u2014 which most major mail providers do \u2014 all messages you send through Gmail will be encrypted in this manner.<\/p>\n<p>What that basically means is that it&#8217;ll be incredibly difficult for anyone to look at a message while it&#8217;s en route from point A to point B. It <em>doesn&#8217;t<\/em>, however, guarantee that the message will remain private or available only to the intended recipient once it reaches the destination mail server. Google itself, for instance, has the ability to see messages associated with your account, which is what allows the company to scan your email for potential spam and phishing attacks \u2014 and also to offer advanced features like Smart Reply, which suggests responses based on an email&#8217;s contents. (Google used to scan messages for ad targeting, too, but it <a href=\"https:\/\/www.nytimes.com\/2017\/06\/23\/technology\/gmail-ads.html\" rel=\"noopener nofollow\" target=\"_blank\">stopped doing that<\/a> last year.)<\/p>\n<p>If the person with whom you&#8217;re corresponding is using a mail server that <em>doesn&#8217;t <\/em>support TLS, meanwhile, messages won&#8217;t be encrypted at all. (With paid G Suite accounts, administrators can opt to allow <em>only<\/em> messages with TLS encryption to be sent or received \u2014 though that&#8217;d obviously have its own set of <a href=\"https:\/\/support.google.com\/a\/answer\/2520500?hl=en\" rel=\"noopener nofollow\" target=\"_blank\">likely undesirable consequences<\/a>.)<\/p>\n<p>Beyond that basic form of encryption, Gmail supports an enhanced standard known as S\/MIME \u2014 or Secure\/Multipurpose Internet Mail Extensions. It&#8217;s available only for paid G Suite Enterprise and G Suite Education accounts, so if you&#8217;re using a regular free Gmail account, it doesn&#8217;t apply to you.<\/p>\n<p>For folks with G Suite setups, though, S\/MIME (which may or may not have been invented by a mime) allows emails to be encrypted with user-specific keys so that they remain protected during delivery and can be decrypted only by the intended recipient.<\/p>\n<p>Like TLS, S\/MIME works only if both the sender and recipient are using a service that supports it \u2014 and, in an extra layer of complication, only if both parties have exchanged keys in advance so that the encryption can be properly configured. Like TLS, it also doesn&#8217;t do anything to keep a message secured once it&#8217;s reached its actual destination server (and so again, within Gmail, Google itself will be able to scan messages in its usual automated way).<\/p>\n<p>Last but not least, S\/MIME has to be enabled by a G Suite admin before it&#8217;ll work.<\/p>\n<p>Google&#8217;s been talking about adding end-to-end encryption into Gmail <a href=\"https:\/\/venturebeat.com\/2014\/04\/21\/google-is-researching-ways-to-make-encryption-easier-to-use-in-gmail\/\" rel=\"noopener nofollow\" target=\"_blank\">since 2014<\/a>, but all of that talk hasn&#8217;t amounted to much so far (and may not ever, according to <a href=\"https:\/\/www.wired.com\/2017\/02\/3-years-gmails-end-end-encryption-still-vapor\/\" rel=\"noopener nofollow\" target=\"_blank\">some analyses<\/a>). The only way to get that level of protection in Gmail right now is to rely on a third-party service such as <a href=\"https:\/\/flowcrypt.com\" rel=\"noopener nofollow\" target=\"_blank\">FlowCrypt<\/a>, which is available as a Chrome or Firefox extension on the desktop. (An Android app is also available in a <a href=\"https:\/\/play.google.com\/apps\/testing\/com.flowcrypt.email\" rel=\"noopener nofollow\" target=\"_blank\">pre-release beta form<\/a>.)<\/p>\n<p>FlowCrypt adds a &#8220;Secure Compose&#8221; button into your regular Gmail interface, which allows you to send encrypted messages using the PGP (Pretty Good Privacy \u2014 yes, that&#8217;s actually what it&#8217;s called) standard. Your recipient will need to have FlowCrypt or another PGP system set up and will also need to have your personal PGP key in order to decrypt and view your messages. Alternatively, you can use the extension to encrypt a message with a password, which you&#8217;d then have to provide to the recipient in some way.<\/p>\n<p>So, yeah: It isn&#8217;t exactly simple, and the third-party add-on implementation certainly isn&#8217;t ideal. But it can get the job done. And it&#8217;s free \u2014 to a degree: If you want to unlock the service&#8217;s full set of features and remove all of its restrictions, you&#8217;ll have to pony up <a href=\"https:\/\/flowcrypt.com\/pricing\" rel=\"noopener nofollow\" target=\"_blank\">$5 a month<\/a> for a premium subscription.<\/p>\n<p>Yeah, don&#8217;t put much stock into that. Confidential Mode is a feature launched as part of <a href=\"https:\/\/www.computerworld.com\/article\/3269415\/email\/25-tips-for-getting-the-most-out-of-the-new-gmail-features.html\">the Gmail revamp<\/a> earlier this year. The idea is that it lets you prevent someone from forwarding, copying, printing, and downloading anything you send them \u2014 and, if you want, lets you set an expiration date after which your message will no longer be accessible. You can also create a passcode, delivered via email or text message, that&#8217;s required in order to open the message.<\/p>\n<p>That all sounds nice enough on the surface, but the problem is that it doesn&#8217;t really do a heck of a lot when it comes to actual security. Messages still aren&#8217;t encrypted in any end-to-end manner, meaning Google (and other mail services) are still able to view and store them. The &#8220;no forwarding, copying, printing, and downloading&#8221; bit doesn&#8217;t mean much, either, since anyone can still take a screenshot of a message if they&#8217;re so inclined. (Google has said the feature is less about that level of security and more about simply discouraging people from <em>accidentally <\/em>sharing sensitive info where they shouldn&#8217;t.)<\/p>\n<p>The same applies to the message expiration dates \u2014 as does the fact that an &#8220;expired&#8221; message continues to exist in your own Gmail Sent folder. All in all, Confidential Mode has the potential to be useful for what it is, but it doesn&#8217;t involve encryption or any sort of meaningful, higher-level privacy. In fact, the Electronic Frontier Foundation has gone as far as to say the mode could <a href=\"https:\/\/www.eff.org\/deeplinks\/2018\/07\/between-you-me-and-google-problems-gmails-confidential-mode\" rel=\"noopener nofollow\" target=\"_blank\">create a <em>false<\/em> sense of security<\/a> and discourage users from finding more serious solutions.<\/p>\n<p>If native end-to-end encryption and the highest possible level of privacy is what you&#8217;re after, your best bet is to look outside of Gmail and toward a standalone email app called <a href=\"https:\/\/protonmail.com\/\" rel=\"noopener nofollow\" target=\"_blank\">ProtonMail<\/a>. ProtonMail is among the <a href=\"https:\/\/www.computerworld.com\/article\/3269019\/android\/the-best-privacy-and-security-apps-for-android.html#toc-4\">best privacy and security apps on Android<\/a> \u2014 and for good reason: It makes privacy a top priority in ways no form of standard Gmail encryption can match.<\/p>\n<p>First, ProtonMail uses an open-source method of end-to-end encryption that ensures no one beyond your intended recipient \u2014 not even the folks at ProtonMail \u2014 can ever see your messages. Beyond that, the app doesn&#8217;t require you to provide any personal information to use it, and the company maintains no records of IP addresses or anything else that could associate your identity with your account. Its servers are also hosted in Switzerland \u2014 in a &#8220;bunker 1000 meters under the Swiss alps,&#8221; no less \u2014 which has its own apparent <a href=\"https:\/\/protonmail.com\/blog\/switzerland\/\" rel=\"noopener nofollow\" target=\"_blank\">set of security benefits<\/a>.<\/p>\n<p>So here&#8217;s how it works: When you sign up, ProtonMail gives you a custom email address at its domain. You can then use that address to send secure messages within the ProtonMail <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ch.protonmail.android\" rel=\"noopener nofollow\" target=\"_blank\">Android app<\/a>, <a href=\"https:\/\/itunes.apple.com\/app\/protonmail-encrypted-email\/id979659905\" rel=\"noopener nofollow\" target=\"_blank\">iOS app<\/a>, or <a href=\"https:\/\/mail.protonmail.com\/login\" rel=\"noopener nofollow\" target=\"_blank\">web interface<\/a>. Anytime you email someone else with a ProtonMail address, encryption is automatic. If you email someone who <em>isn&#8217;t <\/em>using ProtonMail, you can choose to send the message unencrypted \u2014 just like any regular ol&#8217; email \u2014 or you can click a button to create a password and hint that the recipient will need in order to decrypt and read your message.<\/p>\n<p>ProtonMail is free at its most basic level, which gives you a single ProtonMail address, 500MB of storage, and up to 150 messages per day. You can get more storage, more messages per day, and access to advanced features \u2014 like email filters, an auto-responder system, and support for custom domains \u2014 starting at $59 a year.<\/p>\n<p>It isn&#8217;t technically <em>Gmail <\/em>encryption, of course, but you can <a href=\"https:\/\/protonmail.com\/support\/knowledge-base\/transitioning-from-gmail-to-protonmail\/\" rel=\"noopener nofollow\" target=\"_blank\">import your Gmail messages<\/a> or set up Gmail to forward to ProtonMail \u2014 or just use ProtonMail as a supplement to Gmail for the times when you need the strongest possible level of protection. When privacy is a priority and you don&#8217;t want to take any chances, it&#8217;s an excellent option to have.<\/p>\n<p><i>Sign up for <a href=\"https:\/\/www.androidintel.net\" rel=\"noopener nofollow\" target=\"_blank\">my weekly newsletter<\/a> to get more practical tips, personal recommendations, and plain-English perspective on the news that matters.<\/i><\/p>\n<p><strong>[<a href=\"https:\/\/www.computerworld.com\/video\/series\/8536\/android\">Android Intelligence videos at Computerworld<\/a>]<\/strong><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3322497\/security\/gmail-encryption.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/11\/gmail-encryption-100780877-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Thu, 22 Nov 2018 04:00:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Encryption may sound like a subject best left to hackers and tinfoil hat wearers, but don&#8217;t be fooled: It&#8217;s a critical part of contemporary life and something that&#8217;s important for everyone, especially business users, to understand. And one of the places where encryption is most relevant <em>and<\/em>\u00a0misunderstood is in the realm of email.<\/p>\n<p>If you&#8217;re using Gmail for electronic communication \u2014 be it for business, for personal use, or a combination of the two \u2014 it&#8217;s well worth your while to know how the service does and doesn&#8217;t secure your information and what steps you can take to make sure you&#8217;re getting the level of privacy you need.<\/p>\n<p>Ready to dive in?<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3322497\/security\/gmail-encryption.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11222,11066,714,11619,20233],"class_list":["post-13894","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-email","tag-mobile-apps","tag-security","tag-software","tag-web-applications"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13894"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13894\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13894"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}