On 4/14/2016 6:52 AM, Rich Kulawiec wrote:
On Wed, Apr 13, 2016 at 08:35:54PM -0700, Jay Hennigan wrote:
It also sounds like the recipient is in all cases being asked to
click on a link in email which is likely to be from an unknown
sender (to avoid DMARC issues). This is a potential malware vector.
Agreed: it's also a spyware/tracking/surveillance vector, *and* it's a
worst practice in mail system engineering.  Users should never need a
web browser (in any sense of that term) in order to read their email.

---rsk

Keep in mind this isn't "Normal" e-mail. This is a way to send encrypted mail. Yes I know there are other methods. Sharing keys and using encrypted/decrypt plugins. However that method is also difficult when you have a lawyer sending a regular internet user something that needs to be encrypted. Most end users simply don't know how to deal with that.

Along the same lines would be to have encryption/decryption setup on appliances like a Sophos UTM for both the sender and receiver. This really only works with enterprises talking to known other enterprises that get this configured.

Could do a encrypted PDF which might work better. I know some mail server will not deliver encrypted pdf's.

I do know that many hospitals, banks etc. Do use this type of encryption to e-mail the client and basically tell them to log into there web portal to view the encrypted e-mail.

What other options are our there for sending encrypted e-mails?

Sincerely,

Mark

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to