SlideShare a Scribd company logo
1 of 16
Why encrypt your emails?
Why encrypt your emails?
Most people only protect their emails while
they are in transit (i.e. being sent from your
internet browser to the recipient’s browser).
But emails live forever and data should be
protected at all times.
The only way to do this is to use end-to-end
encryption.
The idea of end-to-end encryption
The reality of end-to-end
But it doesn’t have to be this
way…
End-to-end can be:
• Easy
• One-click
• Integrated with your existing email account
• Free
• On your smartphone
Say “hello” to Jumble
No technical wizardry required:
• Easy
• One-click
• Integrated with your existing email account
• Free
• And on your smartphone
Sign me up!
Register for FREE!
How to install Jumble
(Explain it to me like I’m a kid)
Step 1: Do you have Gmail?
Yes
go to Step 2 on the
next slide
No
Create one!
Step 2: Using Chrome?
Yes
Go to Step 3
No
Get Chrome!
Step 3: Register
Register for FREE!
Note: you’ll be brought to Jumble’s site and asked
to:
• Give us your Gmail address; and
• Create a password.
Step 4: Install Jumble
Go to the Google Chrome store
Click the button
You will now see the Jumble extension in
your Chrome browser
Step 5: Login to Jumble
• Click the logo in your Chrome browser
• The window below will pop open for you to
log in to.
Enter the:
Gmail address you registered; and
The password you created in Step 3
Step 6: Protect your data
You’re done!
Compose an email and select
the newly added
button to encrypt your data.
Note: You can still send emails
that are not encrypted – Jumble
gives you the choice…
How to protect your emails

More Related Content

Similar to How to protect your emails

Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activistsSanjana Hattotuwa
 
Snip it before you ship it
Snip it before you ship itSnip it before you ship it
Snip it before you ship itWilbert Heinen
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and ThyselfiLinkoln Meetup
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationChurch of the Epiphany
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet securityMoses Ngeth
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-finalroutbisu
 
Microsoft DigiSeniors Module: Computing with Confidence
Microsoft DigiSeniors Module: Computing with ConfidenceMicrosoft DigiSeniors Module: Computing with Confidence
Microsoft DigiSeniors Module: Computing with ConfidenceSmart Chicago Collaborative
 
Union University: Making Teaching & Learning Mobile
Union University: Making Teaching & Learning MobileUnion University: Making Teaching & Learning Mobile
Union University: Making Teaching & Learning MobileMichael M Grant
 
Using Mobile Devices with Teaching & Learning
Using Mobile Devices with Teaching & LearningUsing Mobile Devices with Teaching & Learning
Using Mobile Devices with Teaching & LearningMichael M Grant
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 
Self help class gmail 5 review 031914
Self help class gmail 5 review 031914Self help class gmail 5 review 031914
Self help class gmail 5 review 031914SnowSugar Video
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11William Mann
 
eMail 101 (4) Class for Self help Virtual Senior Center
eMail 101 (4) Class for Self help Virtual Senior Center eMail 101 (4) Class for Self help Virtual Senior Center
eMail 101 (4) Class for Self help Virtual Senior Center SnowSugar Video
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 

Similar to How to protect your emails (20)

Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
Snip it before you ship it
Snip it before you ship itSnip it before you ship it
Snip it before you ship it
 
Email
EmailEmail
Email
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and Thyself
 
Online Security
Online SecurityOnline Security
Online Security
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account information
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet security
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-final
 
Identity toolkit
Identity toolkitIdentity toolkit
Identity toolkit
 
Microsoft DigiSeniors Module: Computing with Confidence
Microsoft DigiSeniors Module: Computing with ConfidenceMicrosoft DigiSeniors Module: Computing with Confidence
Microsoft DigiSeniors Module: Computing with Confidence
 
Union University: Making Teaching & Learning Mobile
Union University: Making Teaching & Learning MobileUnion University: Making Teaching & Learning Mobile
Union University: Making Teaching & Learning Mobile
 
Using Mobile Devices with Teaching & Learning
Using Mobile Devices with Teaching & LearningUsing Mobile Devices with Teaching & Learning
Using Mobile Devices with Teaching & Learning
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Personal use
Personal usePersonal use
Personal use
 
Self help class gmail 5 review 031914
Self help class gmail 5 review 031914Self help class gmail 5 review 031914
Self help class gmail 5 review 031914
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
eMail 101 (4) Class for Self help Virtual Senior Center
eMail 101 (4) Class for Self help Virtual Senior Center eMail 101 (4) Class for Self help Virtual Senior Center
eMail 101 (4) Class for Self help Virtual Senior Center
 
Emailbasicsclass
EmailbasicsclassEmailbasicsclass
Emailbasicsclass
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
Email
EmailEmail
Email
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

How to protect your emails

  • 1.
  • 3. Why encrypt your emails? Most people only protect their emails while they are in transit (i.e. being sent from your internet browser to the recipient’s browser). But emails live forever and data should be protected at all times. The only way to do this is to use end-to-end encryption.
  • 4. The idea of end-to-end encryption
  • 5. The reality of end-to-end
  • 6. But it doesn’t have to be this way… End-to-end can be: • Easy • One-click • Integrated with your existing email account • Free • On your smartphone
  • 7. Say “hello” to Jumble No technical wizardry required: • Easy • One-click • Integrated with your existing email account • Free • And on your smartphone
  • 9. How to install Jumble (Explain it to me like I’m a kid)
  • 10. Step 1: Do you have Gmail? Yes go to Step 2 on the next slide No Create one!
  • 11. Step 2: Using Chrome? Yes Go to Step 3 No Get Chrome!
  • 12. Step 3: Register Register for FREE! Note: you’ll be brought to Jumble’s site and asked to: • Give us your Gmail address; and • Create a password.
  • 13. Step 4: Install Jumble Go to the Google Chrome store Click the button You will now see the Jumble extension in your Chrome browser
  • 14. Step 5: Login to Jumble • Click the logo in your Chrome browser • The window below will pop open for you to log in to. Enter the: Gmail address you registered; and The password you created in Step 3
  • 15. Step 6: Protect your data You’re done! Compose an email and select the newly added button to encrypt your data. Note: You can still send emails that are not encrypted – Jumble gives you the choice…

Editor's Notes

  1. Whether you realize it or not emails are like postcards!   Just as a postcard can be intercepted and read as it’s being sent through the postal network….so can an email. They can even be edited.
  2. You may have heard of 256-bit AES and 2048 bit RSA keys; You may have heard about the time complexity and effort taken to crack a key; Or key exchange; or Or algorithms;
  3. Existing end-to-end solutions are: Hard; Frustrating; and Time consuming.
  4. Just like you don’t need to be a mechanic to drive a car we believe you don’t need to be a computer scientist to send encrypted emails.
  5. You don’t need to know all this because sending an encrypted email can be as simple as clicking a button.
  6. Click on the link https://jumble.io/privacy#register to register with Jumble for FREE (copy & paste this link in to your internet browser)
  7. We’re not saying you’re a kid – just that we’ve made our tutorial as simple as possible ;) You can watch a video instead if you prefer at https://www.youtube.com/watch?v=MDnPY6QJbXA (copy & paste this link in to your internet browser)
  8. More email providers coming soon! Create a Gmail account at https://accounts.google.com/SignUp?continue=https://accounts.google.com/ManageAccount (copy & paste this link in to your internet browser)
  9. More web browsers coming soon! Get Chrome at http://www.google.com/chrome/ (copy & paste this link in to your internet browser)
  10. Click on the link https://jumble.io/privacy#register (copy & paste this link in to your internet browser) to register with Jumble for FREE
  11. Get the Jumble extension at https://chrome.google.com/webstore/detail/jumble/fjiggkonckoakfpobglkbckakfgcnidh (copy & paste this link in to your internet browser)
  12. Nearly there..
  13. That’s it!