That's why I should send my emails securely!
The Federal Office for Information Security explains why you should send your emails securely! status post was published on Facebook :
- Why should I send my emails securely?
- How do I protect the messages?
- What options are there for effectively encrypting my content?
If you ask yourself these questions about email communication, you are already well on the way to better shielding your exchange of information online from the eyes of third parties. If you would like to understand how digital messages can be encrypted and which techniques are to be preferred, you will find a compact introduction to the topic as well as further content at BSI for Citizens. (mb)
Encrypt emails, exclude unwanted readers
Most people communicate via email almost every day. But few people are aware that unencrypted emails can be read or changed. Similar to a postcard, private or sensitive information is not protected from unwanted readers. These should only be sent by post in a securely sealed letter and ideally with a seal. Thanks to various encryption methods, users can also achieve this level of security for emails. Encryption is intended to prevent anyone from being able to decipher the contents of a message.
There are currently two main encryption methods available: point-to-point encryption (transport encryption) and end-to-end encryption (E2E).
The more secure of the two options is E2E encryption, as it not only protects the transport route of the message, but also protects the emails from unauthorized access at the communication nodes in the network. It ensures the basic protection goals of communication on the Internet:
- Confidentiality: Only the authorized recipient can read the content of the email
- Integrity: Third parties cannot change the content without being noticed
- Authenticity: The message actually comes from the specified sender
Transport encryption is not complete protection for an email
Transport encryption secures the transport route between the email program and the email service provider - for example using the widely used “Transport Layer Security” ( TLS ) protocol. The sender's provider forwards the email to the recipient's respective provider. However, with transport encryption, the message is only unreadable between the nodes of the message path. At the nodes themselves, such as the email service provider's server, it is unencrypted. It is more difficult for unauthorized persons to read the email while it is being sent. However, the mail service providers have access to the content. Once stored on the mail server, emails can then become a target for attacks by Internet criminals.
Confidentiality: End-to-end encryption protects messages end-to-end
If you want to avoid third parties reading your data, you should use end-to-end encryption (E2E). E2E does not encrypt the communication channel, but rather the individual email.
An essential basis for this type of communication is: All communication partners have a digital key pair, the so-called “public key” and the matching “private key”.
Only the owner knows the private key and must always keep it secret. The associated public key is comparable to an opened padlock: although anyone who has the lock can close it, only the owner of the associated private key can open it. The open lock, the public key, is therefore passed on by the owner to the respective communication partner. Before it is sent, the communication partner then locks the email with the public key. Only the recipient can open the message with the appropriate private key and read the email.
In this way, the message is protected from unauthorized access at all times during transmission, including at the nodes. Complete encryption of emails can ensure the confidentiality of information transmission and make the message only accessible to selected people.
E2E encryption can only work if both communication partners use an appropriate encryption program .
Integrity: Secure email with a digital signature
In order to additionally check the integrity of a message , the sender can guarantee the integrity of the email with a digital signature. The signature is calculated individually as a checksum (hash value) for each individual message. The result is then encrypted with your own private key. This corresponds to a digital signature that is attached to the email, similar to a seal on an envelope, sealing it tightly. At the other end, the recipient opens and decrypts the checksum with the sender's public key and compares it with the checksum of the received message. If both agree, it is clear that the message has not been changed along the way. However, if this function is possible and activated in the email program, the process is usually automated.
Authenticity: Assign email address to a key pair
If the generated key pair is formally and verifiably linked to an email address, it is ensured that the message actually comes from the email address to which the key pair belongs. An E2E encrypted email with a signature corresponds to a taped and sealed letter.
Only when users become active themselves can they send messages using E2E encryption. For example, you should expand your email application with a suitable plug-in. You can find out more about this Email Encryption section
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

