{"id":809,"date":"2012-11-15T02:55:50","date_gmt":"2012-11-15T02:55:50","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2012\/11\/15\/when-will-our-email-betray-us-an-email-privacy\/"},"modified":"2023-07-28T16:27:58","modified_gmt":"2023-07-28T20:27:58","slug":"when-will-our-email-betray-us-an-email-privacy","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2012\/11\/15\/when-will-our-email-betray-us-an-email-privacy\/","title":{"rendered":"When Will our Email Betray Us? An Email Privacy Primer in Light of the Petraeus Saga | Electronic Frontier Foundation"},"content":{"rendered":"<p>See on <a style=\"font-weight:bold;font-size:16px\" href=\"http:\/\/www.scoop.it\/t\/rights-liberties\/p\/3337942212\/when-will-our-email-betray-us-an-email-privacy-primer-in-light-of-the-petraeus-saga-electronic-frontier-foundation\" target=\"_blank\" rel=\"noopener\">Scoop.it<\/a> &#8211; <a href=\"http:\/\/www.scoop.it\/t\/rights-liberties\" target=\"_blank\" rel=\"noopener\">Rights &amp; Liberties<\/a><\/p>\n<p><a href=\"https:\/\/www.eff.org\/deeplinks\/2012\/11\/when-will-our-email-betray-us-email-privacy-primer-light-petraeus-saga\" target=\"_blank\" rel=\"noopener\">See on eff.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>See on Scoop.it &#8211; Rights &amp; Liberties See on eff.org<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-809","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":288,"url":"https:\/\/melange.dmaculate.me\/home\/2015\/02\/06\/the-worlds-email-encryption-software-relies-on\/","url_meta":{"origin":809,"position":0},"title":"The World\u2019s Email Encryption Software Relies on One Guy, Who is Going Broke &#8211; ProPublica","author":"aslam","date":"February 6, 2015","format":"link","excerpt":"The World\u2019s Email Encryption Software Relies on One Guy, Who is Going Broke - ProPublica","rel":"","context":"In \"GnuPG\"","block_context":{"text":"GnuPG","link":"https:\/\/melange.dmaculate.me\/home\/tag\/gnupg\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":621,"url":"https:\/\/melange.dmaculate.me\/home\/2013\/08\/10\/lavabit-email-service-snowden-reportedly-used\/","url_meta":{"origin":809,"position":1},"title":"Lavabit, email service Snowden reportedly used, abruptly shuts\u00a0down","author":"aslam","date":"August 10, 2013","format":false,"excerpt":"See on Scoop.it - Rights & LibertiesRemember when word circulated that Edward Snowden was using Lavabit, an email service that purports to provide better privacy and security for users than popular web-based free services like Gmail?See on boingboing.net","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1524,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/07\/30\/oppose-the-internet-blacklist-bill\/","url_meta":{"origin":809,"position":2},"title":"Oppose the Internet Blacklist Bill","author":"aslam","date":"July 30, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesTAKE ACTION: http:\/\/act.demandprogress.org\/letter\/pipa_letter\/ Click the above link to send an email to your lawmakers urging them to oppose the Internet Bla\u2026Show original","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":377,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/11\/26\/dhs-set-to-destroy-governmentwide-network\/","url_meta":{"origin":809,"position":3},"title":"DHS Set to Destroy Governmentwide Network Surveillance Records &#8211; Nextgov.com","author":"aslam","date":"November 26, 2014","format":"link","excerpt":"Categories of Records Headed to the Trash Folder Core Infrastructure \u2013 Email, contact and other personal information of federal workers and public citizens who communicate concerns about potential cyber threats to DHS; \u201cSuspicious files, spam and other potential cyber threats via an email network\u201d exclusively used within DHS\u2019 Mission Operating\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":443,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/09\/04\/plos-one-conscious-brain-to-brain-communication\/","url_meta":{"origin":809,"position":4},"title":"PLOS ONE: Conscious Brain-to-Brain Communication in Humans Using Non-Invasive Technologies","author":"aslam","date":"September 4, 2014","format":"link","excerpt":"The binary encoded messages were sent by email.PLOS ONE: Conscious Brain-to-Brain Communication in Humans Using Non-Invasive Technologies","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":442,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/09\/09\/wow-nastygram-from-the-brown-campaign\/","url_meta":{"origin":809,"position":5},"title":"Wow: Nastygram from the Brown campaign","author":"aslam","date":"September 9, 2014","format":"link","excerpt":"lessig: I received this nastygram (PDF) by email today from Scott Brown\u2019s campaign manager \u2014 cc-ing my boss, the provost and president. I take it Mr. Reed\u2019s outrage is triggered by the Senate\u2019s regulations of what constitutes being a \u201clobbyist\u201d for purposes of the Senate rules. I hadn\u2019t received\u2026 Wow:\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=809"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/809\/revisions"}],"predecessor-version":[{"id":2652,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/809\/revisions\/2652"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}