Who Let the Carnivores Out?

"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- Benjamin Franklin

Hushmail is a free e-mail service that offers transparent, end-to-end encryption of your e-mail without requiring correspondents to install and use complicated software.

ZipLip closely resembles Hushmail. You can set a time limit on the messages that you send, so that they expire-- and can't be retrieved, even from the recipients' systems-- after the specified date.

1on1 is a commercial service and uses dedicated software, but it offers an additional, cool feature: You can remotely retract and delete mail that you decide, after sending, you shouldn't have sent.

GNU Privacy Guard is free software that offers strong encryption services to Linux users; GNUPG is increasingly supported by Linux-based e-mail packages.


American Civil Liberties Union, 1995. "Civil Liberties Implications of the Anti-Terrorism Act of 1995", available on-line at http://www.aclu.org/congress/terract.html.

Banisar, David. 1995. Bugoff! A Primer for Human Rights Groups on Wiretapping. Washington: Privacy International. Available on-line at http://www.tscm.com/bug_off.html.

Bellovin, Steven, Matt Blaze, David Farber, Peter Neumann, and Eugene Spafford, "Comments on the Carnivore System Technical Review". Available on-line at http://www.crypto.com/papers/carnivore_report_comments.html.

Electronic Privacy Information Center, December 1, 2000. Letter to Carnivore Review Panel, U.S. Dept. of Justice. Available on-line at http://www.epic.org/privacy/carnivore/review_comments.html

Forno, Richard. 2000. "Who's Afraid of Carnivore? Not Me", available on-line at http://www.infowarrior.org/articles/carnivore.html.

Graham, Robert. September 7, 2000. "Carnivore FAQ." Available on-line at http://www.robertgraham.com/pubs/carnivore-faq.html.

Hayes, Frank. 2000. "Quick and Dirty", ComputerWorld, Dec. 15, 2000 (available on-line at http://www.computerworld.com/cwi/story/0,1199,NAV47_STO54989,00.html).

U.S. Federal Bureau of Investigation. 2000. "FBI Programs and Initiatives: Carnivore Diagnostic Tool", available on-line at http://www.fbi.gov/programs/carnivore/carnivore.htm

Willing, Richard. 1998 "Courts OK Record Number of Wiretaps", USA Today, Sept. 30, 1998. Copy available on-line at http://www.inet-one.com/cypherpunks/dir.98.09.28-98.10.04/msg00121.html.


One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix