{"id":5566,"date":"2011-12-01T10:15:25","date_gmt":"2011-12-01T17:15:25","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=5566"},"modified":"2018-05-29T11:38:21","modified_gmt":"2018-05-29T17:38:21","slug":"for-your-eyes-only-please","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/12\/01\/for-your-eyes-only-please\/","title":{"rendered":"For your eyes only (please)"},"content":{"rendered":"<p><strong><em>By the Webroot Threat Team<\/em><br \/>\n<\/strong><\/p>\n<p>Have you ever had the queasy experience of sending a message to someone that you\u2019d rather not have anyone else see, and then hoping that it won\u2019t get passed along? A new system developed by Internet law and security researchers aims to solve the problem, with a light-handed touch.<\/p>\n<p>The Stanford Center for Internet and Society has launched Privicons, an email privacy tool that it describes as a \u2018user-to-user\u2019 solution. There are no policy servers, crypto algorithms, or software enforcement agents to worry about. Instead, it relies on good old-fashioned icons.<\/p>\n<p>Webmail users who install the Privicons plugin can choose from a selection of icons that are then pasted into their mail. Each of the icons represents a specific request concerning how the information in the mail is treated. The icons are as follows:<\/p>\n<table border=\"0\">\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/001_keep-private.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-5573\" title=\"001_keep-private\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/001_keep-private.png\" alt=\"\" width=\"40\" height=\"40\" \/><\/a><\/td>\n<td><strong>\u00a0\u00a0&#8216;Keep private&#8217;<\/strong>: Don\u2019t pass on the information, or identify the sender.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/002_keep-anonymous.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-5568\" title=\"002_keep-anonymous\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/002_keep-anonymous.png\" alt=\"\" width=\"40\" height=\"40\" \/><\/a><\/td>\n<td><strong>\u00a0\u00a0&#8216;Keep anonymous&#8217;<\/strong>: Use the information freely, but don\u2019t tell anyone who sent it to you.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/003_dont-print.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-5569\" title=\"003_dont-print\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/003_dont-print.png\" alt=\"\" width=\"40\" height=\"40\" \/><\/a><\/td>\n<td><strong>\u00a0\u00a0&#8216;Don\u2019t print&#8217;<\/strong>: This can be for environmental or security reasons.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/004_delete-after-reading.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-5570\" title=\"004_delete-after-reading\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/004_delete-after-reading.png\" alt=\"\" width=\"40\" height=\"40\" \/><\/a><\/td>\n<td><strong>\u00a0\u00a0&#8216;Delete after reading\/X days&#8217;<\/strong>: Delete the information to avoid it falling into the wrong hands.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/005_keep-internal.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-5571\" title=\"005_keep-internal\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/005_keep-internal.png\" alt=\"\" width=\"40\" height=\"40\" \/><\/a><\/td>\n<td><strong>\u00a0\u00a0&#8216;Keep internal&#8217;<\/strong>: Keep it among a close circle of people.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/006_please-share.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-5572\" title=\"006_please-share\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/006_please-share.png\" alt=\"\" width=\"40\" height=\"40\" \/><\/a><\/td>\n<td><strong>\u00a0\u00a0&#8216;Please share&#8217;<\/strong>: Distribute freely.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!--more--><\/p>\n<p>Representatives for the project specifically define this as a signal- versus code-based approach to email privacy. The underlying principle is that they\u2019re easy to include in an email as a simple way to indicate the way that you\u2019d like your content and your identity to be treated, but that they cannot be technically enforced. This approach acknowledges that once a mail arrives with a recipient, it is up to them what they do with it. You\u2019re essentially relying on them to be a good egg.<\/p>\n<p>Even the full text describing the purpose of each icon makes this clear. For example, the text associated with the \u2018Keep internal\u2019 icon reads:<\/p>\n<p>\u201cThe judgment of whether a person is within such a circle belongs solely to the recipient, unless the sender chooses to clarify which group is acceptable.\u201d<\/p>\n<p>This idea of asking rather than enforcing email privacy has led to a <a href=\"https:\/\/plus.google.com\/u\/0\/114753028665775786510\/posts\/UKbNsLQwjnD\">discussion<\/a> about whether icons that aren\u2019t legally or technically enforceable are worthwhile.<\/p>\n<p>On the one hand, this is unlikely to satisfy compliance officers. On the other hand, it is a lot more workable than more stringent technical approaches that use digital rights management to enforce email privacy. These systems enable you to set rules about who reads your content and what happens to attachments that are then enforced by the recipient\u2019s email software. But they are usually locked down to a particular vendor\u2019s system, making it difficult, say, to enforce via webmail. And what happens if you want to enforce such email privacy solutions on a contractor\u2019s Mac, when the rules were set up on Exchange, via a PC running Outlook?<\/p>\n<p>The Privicons team has <a href=\"http:\/\/tools.ietf.org\/html\/draft-koenig-privicons-02\">proposed<\/a> the system officially to the Internet Engineering Task Force. As a stopgap for the technologically challenged that promote the use of heterogeneous email clients, they\u2019re a potentially useful tool.<\/p>\n<p>But there are other measures, providing more effective protection. In whistleblowing situations, and other scenarios where you must protect your content and your identity for unusual reasons, you can encrypt your sensitive content and provide access credentials via a separate channel. And anonymous remailers can also help you shield your identity.<\/p>\n<p>But in the 99% of cases where the situation isn\u2019t as critical, perhaps the solutions are even more simpler:<\/p>\n<ul>\n<li>Never mail anyone anything that you wouldn\u2019t want your mother to see.<\/li>\n<li>Never mail anything saying anything about a third party that you wouldn\u2019t want that third party to read.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By the Webroot Threat Team Have you ever had the queasy experience of sending a message to someone that you\u2019d rather not have anyone else see, and then hoping that it won\u2019t get passed along? A new system developed by Internet law and security researchers aims to solve the problem, with a light-handed touch. The [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[15857,3739,9075,3493,9073,9085,22389,9081,6303,3557,3489,8585,9077,3783,9083,22391,8015,22387,3819,9079],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5566"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=5566"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5566\/revisions"}],"predecessor-version":[{"id":17088,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5566\/revisions\/17088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17051"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=5566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=5566"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=5566"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=5566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}