Email Encryption End-to-End
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says. — Glenn Greenwald and Ewen MacAskill (UK Guardian): NSA Prism program taps in to user data of Apple, Google and others
Email encryption has become a hot topic since the revelations by Edward Snowden in mid-2014 that the NSA gobbles up every email message you send, then sifts through them to ascertain whether they contain something worth examining more closely (such as your business plans), or even whether you might be a person of interest to some other 3-letter agencies. But most people believe (partly rightly so) that email encryption is difficult. It doesn't have to be. This software is very easy to use (but nevertheless provides strong encryption). Here is a sample screenshot just prior to encrypting a message:
Prices Download the
a user license
Translate to: Software Shop Home Page
Email Encryption End-to-End makes it easy to send and receive encrypted email. It can be used to encrypt a message to be sent via any desktop email program or webmail that supports attachments (that is, files attached to a message). The encrypted message consists of a text message (up to 60 KB in size) plus, optionally, an appended file of any type (up to 1,980 KB = 1.93 MB in size). The message (including any appended file) is encrypted and written to a ciphertext file. You then attach this file to an ordinary email message. Thus your message is encrypted before it leaves your PC to go to the mail server, and it remains encrypted during transmission to the recipient's ISP and while being downloaded to the recipient's PC. Thus the message is encrypted "end-to-end", and, if intercepted anywhere between your PC and the recipient's PC, cannot be read.
User Manual Use of the Program
Specifying the Encryption Key
Comparing Plaintext and Ciphertext for Randomness
How to Test the Trial Version
The Encryption Method
See also: A Practical Example of the Use of Email Encryption End-to-End
Here is a good article on this subject by Gary Smith:
Email Encryption — A Security System for Today's Wired World
See also German Firms Race to Shield Secrets
and The Encryption Debate is Really About How Best to Spy on You
Here is download3k's review of this software: Email Encryption End-to-End 10.01
Trial version: A trial version of Email Encryption End-to-End can be downloaded from this website. Click on the link below to go to a web page with further information:
Download Email Encryption End-to-End ...
Price and ordering: A single-user license for the fully-functional software is available for a period of 3 months, 1 year or with no time limit (a 'perpetual' license). Prices for each type of license are given at Purchase a User License. (A multiple-user license is available for this program.) An activation key is required in order to make the trial version permanently fully functional, and can be obtained immediately (or soon after) your purchase.
Refund: A refund will be provided promptly up to 30 days after purchase if the software does not perform satisfactorily.
Updates: Purchasers of a user license for this software are entitled to an update to any later version at no additional cost.
Hermetic Systems Home Page