* on the Thu, Jun 04, 2015 at 01:21:44PM +0200, Michael Ströder wrote:

>> I would suggest using Ciphermail / Djigzo for this.
>> But I think you are solving your problem in a very incorrect way. Since the
>> hosting company do have access to the VM, they could easy listen on the 
>> memory
>> before the mail is encrypted, just after it has been decrypted by the TLS
>> handler.
> 
> Yes. Local encryption does *not* protect you against the mail hoster grabbing
> data and .
> 
> The only valid use-case for local encryption:
> If the mail hoster has to reveal a copy of your mailbox to legal authorities
> the content cannot be viewed without your private key. Nevertheless the mail
> headers are readable.

Also, if an attacker gets access to your email account. It prevents them from
being able to do what they usually do: Take over all of your other online
accounts by triggering password reset emails. They'll still be able to trigger
the reset emails, and receive them, but they wont be able to read.

-- 
Mike Cardwell  https://grepular.com https://emailprivacytester.com
OpenPGP Key    35BC AF1D 3AA2 1F84 3DC3   B0CF 70A5 F512 0018 461F
XMPP OTR Key   8924 B06A 7917 AAF3 DBB1   BF1B 295C 3C78 3EF1 46B4

Attachment: signature.asc
Description: Digital signature

Reply via email to