Data privacy has become absolutely crucial for businesses. And some businesses go to great lengths to protect their data, files, and communications.
But consumers and smaller businesses seem to think that adding extra security isn't worth the extra work required. The problem with this take is anyone who refuses to take the extra steps might find themselves on the wrong end of a data breach.
Also: How to enable end-to-end encryption for Facebook Messenger chats
You might have sent some sensitive information in an innocent email, only to find some bad actor intercepted the message and was able to easily read the content of that email and extract the information.
You don't want that. Even if it does require an extra bit of work on your part, being safe is much better than being sorry.
So what do you do? You encrypt your email (or the email containing sensitive information).
Email encryption is a way to restrict an email such that only the recipient can read it. This works by way of encryption key pairs like so:
If the email is intercepted on the way, it cannot be read without the matching private key. That, of course, brings up one crucial issue that cannot be stressed enough -- never share your private key with anyone.
Also: 4 ways to secure your remote work setup
Yes, adding encryption to email does add extra steps to your process, but when dealing with sensitive information, those extra steps will be well worth the effort.
Because every email client does this differently, I'm going to demonstrate using the open-source Thunderbird application. I'm also going to demonstrate how to create your GPG key (using GnuPG), so you can help your recipients generate the necessary key pairs so they can send you their private keys.
Here's how it works.
I'll be demonstrating on Pop!_OS Linux, but this will work the same way on any platform that supports GnuPG (Linux and MacOS).
Also: 8 things you can do with Linux that you can't do with MacOS or Windows
For the Windows OS, you'll need to use Gpg4win.
To generate a keypair, open a terminal window and issue the command:
gpg --full-generate-key
You'll be asked the following questions (answer with the defaults):
When prompted, type y to verify the creation of the key. You'll then be required to add a real name, an email address associated with the key, and an optional comment. Finally, you'll be required to type and verify a password for the new key pair. After that, your key is created and ready for export.
Next, we need to export the public key so it can then be sent to the person who will need to send you an encrypted email.
To export the key, issue the command:
gpg --export -a "EMAIL" > public_key
Where EMAIL is the email associated with the key you just generated. Once you've generated the file (named public_key), send it to the person who will be encrypting the email to you.
Next, we need to import the public key that was sent to you. Open Thunderbird, click the Menu button and click Account Settings.
Also: How to add Send Later functionality to Thunderbird email
In the left sidebar, click End-To-End Encryption and then click OpenPGP Key Manager.
Gaining access to the OpenPGP manager from within Thunderbird.
Screenshot by Jack Wallen/Click File > Import Public Key From File, and then make sure to select All Files from the drop-down at the bottom right corner of the window.
Importing the public key from within the OpenPGP Key Manager.
Screenshot by Jack Wallen/Locate the file you saved (the public key from the recipient that will receive your email) and click Open. In the resulting window, select Accepted (unverified) and click OK. The key will be imported and ready to use.
Importing Henry Jekyll's key might not be the best idea, but I'm going for it.
Screenshot by Jack Wallen/Close the Key Manager and go back to the Thunderbird main window. Compose a new message to the email address associated with the encryption key, and then (in the email compose window) click the Security drop-down and click the checkboxes for Require Encryption and Digitally Sign This Message.
Also: How to add Do Not Track to Thunderbird (and why you should)
Send the message as normal, and it will be encrypted such that the only person that can decrypt it is the owner of the private key that matches the public key you imported.
Encrypting and signing your new email.
Screenshot by Jack Wallen/And that is how email encryption works. I hope you find this to be much easier than you expect and will inspire you to start using this extra security layer in your email communications.