No one is breaking into my office, so why should I use privacy software?

You don’t know if someone is breaking into your system or leaking information. Without encrypted communications, physical security or privacy protocols, anyone can be accessing your files, reading your emails and manipulating your documents without your knowledge.

Your open communications can also put others at risk in places where politically motivated raids are more likely to happen. If you lock your doors, you should encrypt your files. It’s that simple.


How do I choose which encryption software to use?

Some software packages simply don’t do a good job, while others are honey pots. Honey pots lure you into using free and seemingly excellent software provided by the very people who want to spy on you. Still, there are reputable brands – just remember to investigate before you use it.

Ready for a Private and Secure Online Workspace – GoSecure

If I’ve got a firewall, why do I need to encrypt my files?

Firewalls prevent hackers from accessing your hard drive and network but, once you send a file into the internet, it is open to the world. You need to protect it before you send it.

What do we need to keep our IT systems safe?

It depends on your system and your activities, but generally everyone should have:

• A firewall;
• File encryption;
• Virus detection software;
• Secure back-up:
• Passphrases that can be remembered but not guessed;
• A hierarchy of access – everyone in the organization does not need access to all files;
• Consistency – none of the tools will work if you don’t use them all the time!

Is it illegal to use encryption?

It is perfectly legal to use encryption in most countries of the world. However, there are exceptions. In China, for example, organisations must apply for a permit to use encryption, and any encryption technology on your laptop must be declared as you enter the country. Singapore and Malaysia have laws requiring anyone wishing to use encryption to report their private keys. India has some exceptions.

The Electronic Privacy Information Center (EPIC) provides an International Survey of Encryption Policy discussing the laws in most countries. This list was last updated in 2000.

Why should I use encryption?

Everyone should use encryption, because digital communications are inherently unsafe.

Digital technology is a benefit to human rights groups, allowing them easier communications, greater efficiency and more opportunities. However, with any benefits come certain dangers. Just because you wear a seat belt doesn’t mean you are expected to have an accident every time you drive. Driving in a more dangerous situation, such as a race, makes you even more likely to use a seatbelt, just to be safe.

Human rights workers are known targets of surveillance. Since unencrypted emails can be accessed and read by almost anyone, it is almost inevitable that your unencrypted emails will be accessed at some point. Your messages may already be monitored by your opponents and you will never know.

Securely Send E-mails and Transfer Files ??

Even in this day and age, after decades of having the Internet, we are still surprisingly sending and receiving most of our e-mails and information insecurely through the World Wide Web. We’re still using most of the founding protocols and technologies that transfer data in what we call clear-text.

When in clear-text, your passwords and the data content can be captured on the local network you’re connected to, which is an even bigger problem when connected to a public Wi-Fi hotspot or Internet port. Additionally, the data could be captured and read by hackers or eavesdroppers during stops at servers when it’s moving through the Web.


See it for yourself
We discussed that many of the protocols we use today are unencrypted and aren’t secure for working with sensitive information. However, this might not get the point across as efficiently as actually seeing what an eavesdropper or hacker can see.

So if you’re curious, start by downloading a reassembler, such as the EffeTech HTTP Sniffer. Start capturing, browse the Web, and see how easy it is for someone to eavesdrop on unencrypted communications. You might also want to experiment with password sniffers, such as SniffPass.

Upgrade Your Privacy

Questions? We are here to help.

RSS Blog

  • More Demands on Cell Carriers July 13, 2012
    In the first public accounting of its kind, cellphone carriers reported that they responded to a startling 1.3 million demands for subscriber information last year from law enforcement agencies seeking text messages, caller locations and other information in the course of investigations. The cellphone carriers’ reports, which come in response to a Congressio […]
  • Cloud Computing: Managing File Transfers in the Cloud: 10 Points to Demystify the Process May 14, 2012
    Managed file transfer is a well-accepted way for organizations to share business files point-to-point, quickly, reliably and securely. This is a subject that requires attention, especially when it comes to thorny issues, such as enterprise security and compliance. MFT uses different types of applications to securely transfer data from one computer to another […]
  • What Great Bosses know about Leadership Styles May 9, 2012

Select a Category to Search

Select a Month to Search

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2 other followers

GoSecure Business Overview

GoSecure has developed, owns and has licensed the intellectual property associated with its information security portal.

GoSecure Safe allows users to protect sensitive digital information wherever it is stored, and whatever the format maybe. The Safe process of hiding and protecting information inside a “plausible cover” prevents an intruder from detecting the presence of sensitive information.

GoSecures’ masking technology provides a very strong first line of defense for the consumer. By offering integrated strong authentication and information protection, GoSecure provides a level of security that passwords, token key generators and digital certificates alone cannot match.

GoSecure Information Protection Solutions

Upgrade Your Privacy

Product Concept

GoSecure’s core technology is available in Portal and stand-alone Application and/or Enterprise Edition that provides a robust platform for the deployment and management of secure sharing and collaborating of critical and sensitive information. Key features include ease of use, information security and zero impact on work flow.

GoSecure Portal
GoSecure Portal enables members, at any time and at any place, the ability to network ensuring privacy and protection second to none. GoSecure Portal makes secure exchange and universal availability of critical information via Xchange and Backup.

GoSecure Portal offers complete control of your Privacy. It is a secure, collaborative and advertisement free environment where members retain ownership of their information and can manage their privacy unlike any other networking portal.

Software Solutions

GoSecure Safe
GoSecure Safe is a host-device information protection solution and is a cryptographic data vault for critical files. It protects files by encrypting and obfuscating. Access to the Safe application depends on type of authentication implemented.

GoSecure Safe application is available as a Trial or Full Version. The Trial Version is a limited version and is restricted to file protection of 50 KB per file. Trial version can be Upgrade to the Full Version at the cost of US $9.95 per year.

GoSecure Xchange
GoSecure Xchange enables secure share or exchange of critical information via email - a critical end user security requirement. Leveraging GoSecure’s core technology, the critical information is transformed into an innocent looking plausible cover. The plausible cover ensures that the protection stays with the critical information no matter where the information is sent or resides.

GoSecure Xchange is easy to use application. One click and the information is protected and obfuscated and is ready to be transferred securely. Xchange is a premium subscription based service. Xchange is priced at unlimited transactions per month for US $ 9.95 or $96 a year.

GoSecure Backup
Built on GoSecures’ core technology, GoSecure Backup provides encrypted and obfuscated protection for online or offline backup critical information. One click and the content of GoSecure Safe is securely backed up. Once backed up, backup data is available to via Cloud Computing upon strong authentication.

GoSecure Backups easy to use, install, deploy, manage and can be fully automated. Backup is premium subscription based service and is priced at US $ 9.95 per month or US $ 96 annually if paid upfront.

GoSecure Reader
GoSecure Reader application allows you to decode, open and read the plausible covers received via email or any other digital methods. In addition to the reader one must enter Private Key to unlock the plausible cover. The management and distribution of Private Key is up to the end user.

The graph below illustrates GoSecures’ perspective on the relative value of these different security solutions.

GoSecure Information Protection Solutions


GoSecures’ Safe, Xchange, Backup and Reader represent a breakthrough new set of end-user information protection solutions providing users unprecedented levels of security. Unlike traditional encryption solutions, GoSecure solutions provide the added value of no visual or digital signature associated with its protection technology, ensuring the strongest possible protection against un-authorized access to sensitive information.

Technologies including intrusion detection, firewalls, and VPN are focused on protecting infrastructure. Safe, Xchange, and Backup are solutions focused on protecting the users’ most meaningful asset: information or content.


Error: Twitter did not respond. Please wait a few minutes and refresh this page.