How to send emails safely

Currently privacy is a precious commodity that is being lost to the Internet. One can use many means to keep your personal data or information that is shared under some privacy, but not entirely safe. Even emails, media provided by the Net, they are free to be sniffed on the network. In these cases we ask ourselves how we can prevent our emails from being intercepted and read by third ? This situation is unlikely but it happens. So Webespacio here are some steps to protect the emails you send:

Ways to protect your emails

Enable HTTPS secure connection:

If you use Firefox or Chrome browsers activate the HTTPS Everywhere extension security that encrypts your communications when you connect to different websites, making navigation safer. Thus your emails also be encrypted to prevent any read by prying when they are intercepted.

This system automatically switches to be activated thousands of unsafe sites from “http” to “https, which ensures protection against theft forms of surveillance and accountability. It also blocks pop-ups that are unsafe in a particular website.

install the extension you want to make a https-everywhere type and select the download depending on the search engine with which accounts. Once you’ve installed enable HTTPS Everywhere and ready. Now every time you enter your e-mail account through the secure connection, all traffic between your computer and the mail server is encrypted. If someone intercepting your message achieve all you find is a language without meaning.


Connect to WiFi with a VPN service:

For need to access your email via WiFi company will have to use software that has the Virtual Private Network service (VPN). To do this we recommend using the software TunnelBear , a system that ensures the safety, security and privacy of the message on the contact you have with another point, as it creates an encrypted connection between your computer and the websites you visit.

TunnelBear system stores your email, name and the number of times you have logged. Q It does not record the websites you visit, let alone its IP address after being disconnected. If interested follow the following steps to start making use of it:

1. Enter the site
2. Choose whether to download the software for Androi, PC or Mac, or iPhone or iPad.
3. Once you have chosen the options click download Tunnel Bear .
4. On the next page choose the option for PC.
5. Save the program in a safe place on your PC and install appropriate.


send encrypted messages:

If you want to do is send confidential messages and ensure that only the intended recipient will read it then you encrypt the message. To which require an encryption program, among the most popular and safe to find Pretty Good Privacy (PGP). Its creator is Philip R. Zimmermann and was released in 1991.

PGP uses data compression, symmetric key cryptography and public key cryptography. Each public key is linked to a user name and / or email address. That is, you have to enter your email address and a secret password, the program PGP key used to generate a unique public and private key for you.

Now you can compose a mail message as before, but before hitting the send button, let the program PGP encrypt your message with the public key of your friend. When this encoded message reaches your mailbox, you can easily decrypt it using the private key. To send an answer for you, the process is similar, except now use your public key to encrypt the response message.

Encrypt messages


If the PGP

seemed a bit complicated, we bring you another alternative. Mailvelope is integrated directly into the Webmail UI. Its elements are not intrusive and are easy to use to facilitate a normal job. Can be configured for Gmail, Yahoo!,, GMX.

The program is based on OpenPGP, which makes integrated encryption and decryption functions, generated their passwords, store the keys of his friends and, best of all, automatically detects incoming messages containing ciphertext , allowing you to decipher a single click.



Who can access mail messages I send?

When one sends a message, it can be read by the network administrator, your ISP, or by agencies of law enforcement, but also can be intercepted by third parties because the website at you entered may not have the necessary security.

What is the Virtual Private Network (VPN)?

Virtual Private Network is considered the safest method of communication between two points within a public network. Used when you have to connect two or more branches of a company using the Internet as a link, allowing team members support the connection from your home to the computer center, or a user can access your home computer from another location . Its security is based on encrypting communications to ensure that nobody can access content. Also includes concealing your IP address, which is the number that identifies you and says your geographic location.

Possible problems:

    • Https-Everywhere As for Google Chrome is still in alpha stage, some errors may occur, which may cause some pages look strange without the parties that has blocked unsafe. Furthermore, the system does not have an option to disable some actions.
    • Mailvelope

    • is in beta stage, and like https-everywhere can fail.


Advice and tips

    • We recommend using Firefox’s account with a secure version is already stable.
    • Another option is

    • friendly TunnelBear connect to WiFi because you can use a laptop and two mobile devices. In addition, you can connect from anywhere in the world except China.
    • Enter

    • only secure pages otherwise risk having your data stolen. For some of these websites have elements that can steal your account or access files on your computer.
    • Since we’re talking

    • protection emails also consider just recommend article called “how to prevent and identify a scam email”



can not guarantee the privacy of our data, however we can use forms to enhance the privacy of the information. While it is difficult because everything on the internet and anyone can access it will always be alternatives as we show in this article.

Leave a Comment