Because I solved the issue I was having with Thunderbird, I’m ready to publish my public key for all and sundry to use.
What does this mean? Well, from now on the emails you receive from me will be digitally signed and with the public key listed below you can confirm that they are from me1. Do I suspect that I’m being the target of multiple email address stealing thieves? No, but I’d rather start now than later when it becomes an issue. Insurance is something you purchase before you need it.
It also means that anyone who goes through the trouble (and it is a bit of trouble, no matter what the websites say) to set up encryption on their email will be able to exchange fully encrypted emails with me. Do I suspect that some nefarious group is snooping on my emails? No (although my company explicitly says they have that right, as does my ISP, as does the NSA, FBI, law enforcement…), but I’d rather keep my private conversations private, from anyone. As it is right now, your emails flying around the ether are open for snooping by anybody who really wants to. Sure, innocent people have nothing to fear, but we shouldn’t tacitly agree to the snooping. I am not. I want to spread the encryption meme about and make it that much more difficult to access my communications.
Join me in making it more difficult for the government, or anyone else for that matter, to monitor us. I promise that in the next few weeks, I’ll post a how-to for setting up public key encryption using Mozilla Thunderbird and GnuPG. There was a learning curve for me because most of the tutorials were written by and for people who spend a lot of time in front of a command line interface. I think there’s a market for a how-to that’s a bit more explicit.
1This requires software. You don’t just check that public key against my email. As I say in paragraph three of this post, this is a bit of trouble to set up, but relatively seamless once it is
Check over there to your right for my public key.