Warning: Undefined array key "display_for_open_graph" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/facebook-button-plugin/facebook-button-plugin.php on line 635

Author: monellpunches


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 122

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 122

Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 125

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 125

Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 127

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 127

How This Sex Chat Site, Horny Chat, Is Making Their Site More Secure


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Adult orientated parts of the internet are notoriously dangerous for your computer, since especially in the earlier years of the internet, it was easy to get computer viruses there. In more modern times, that’s changed, and it’s safely to browse adult sites without fear of breaking your computer, but one site called Horny Chat is taking things further. Let’s take a look at what they’re doing.

End-to-end encrypted messages

Horny Chat is a site that provides video chat online where anyone can message each other for free. Since the site is entirely anonymous, you won’t even have to leave your username and your messages are end-to-end encrypted. Since most people are scared of malware, that’s a pretty safe thing to offer.

Since the messages are completely anonymous, Horny Chat can’t really tell whether your messages should be trusted. This way Horny Chat is offering a safe place for people to chat, regardless of if you’re a man or a woman.

Extensive privacy options

Besides being very secure, Horny Chat allows you a lot of advanced features as a user. For one, you control what categories you’re willing to receive messages from and can hide them from even seeing (and possibly not even sending to you). Another thing that Horny Chat allows is that you can easily make your messages hidden from friends. You can make them hidden to everyone, just you, or people who have given their permission first.

Another feature of Horny Chat’s privacy options is that you can hide your chat histories from being seen by others. For instance, if you and someone are chatting to each other and you come across a message that you want to keep secret, you can just select “hide”. This will then completely hide the chat from everyone, but if your friend should choose to view the history, they can. Another option is that there’s also the ability to delete your chats from history entirely.

Beyond the privacy features, there are also the “block” and “report” features. These may not be as helpful as some of the privacy options, but they can be handy if someone is causing a problem. Say, for instance, you were chatting to one someone and then she started messaging multiple people, that one person could block her while everyone else can still see the chat. If someone is spamming chat rooms and sending a lot of links to a chat, you could “block” that person immediately. Again, if that person is friends with you, they can see what that person was doing.

Even though these privacy options aren’t as helpful as some of the other options, they do a decent job protecting you from a lot of problems. Even with just these simple privacy options, Horny Chat makes using it a much safer experience.

More secure encryption

Since Horny Chat is end-to-end encrypted, that means your messages aren’t being monitored by their server, but are instead being encrypted as they’re sent from your device to their server and then as they’re sent back to your device. That is what makes these options so secure.

Another thing about the encryption is that Horny Chat allows you to download a copy of their entire database to your computer and then you can use an encryption program to encrypt your chats. If that database gets infected, your chats will be protected from that. Other end-to-end encrypted sites like this don’t allow you to do that.

Even though you could download the database to your computer, it’s still much safer not to do that, since in the event that the FBI or someone else gets their hands on it, then at least you’re protected from that. This encryption also won’t store your contacts lists or your photos like some sites do (some of which also store your credentials, but that’s not what end-to-end encryption is about. Instead, it is about keeping your messages completely and utterly private). You can see how this can be used to increase the security on other sites in the future.

When using Horny Chat, your chat is also encrypted with the following program:

OpenSSL (https://www.openssl.org/).

Since this encryption is more secure, you don’t need to worry about anyone being able to read your chats. Even if Horny Chat is hacked, it can’t read your chat messages.

Conclusion

These end-to-end encrypted chats that Horny Chat provides are quite a good place for chatting. Although many sites provide similar options, there isn’t one option that’s so secure on so many ends. This means that there’s no other site like this out there right now.

It’s not the only site to offer encrypted conversations, of course. But it’s certainly a safe option to have if you’re on this type of site, or to check out the features to decide if they’re something you want.

Sex Chat is an adult platform that allows people to interact to talk about sexual and intimate fantasies. It is a fun place to let your creative juices flow and discuss your kinks and fetishes. You can flirt with other members, find new friends, share stories and other fantasies about sexual things that would turn you on.

How HTTPS Encryption Works To Keep You Safe On Adult Dating Sites


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

What Is HTTPS?

HTTPS is your standard HTTP protocol with a generous layer of delicious SSL encryption. When something goes wrong, it prevents people from modifying requests and snooping up your browsing. It also keeps your passwords, communications and credit card information secure by connecting your computer to the server to which you want to send data.

HTTP is a request response protocol for communication between a client and a server. Hypertext Transfer Protocol Secure (HTTPS) is a more secure version of the HTTP protocol that sends data between your browser and the website to which you are connected. It is used to protect confidential online transactions such as online banking, online shopping and order forms.  

How Does HTTPS Encryption Work?

A crucial step in a secure HTTPS connection is to ensure that the web server is who it claims. An SSL certificate is an important part of the setup because it ensures that the owner of the web server is who the server claims to be. It works much like a driver’s license by confirming the owner’s identity.  

After receiving confirmation from the server, the client initiates the SSL-encrypted session. After checking the SSL certificate, the browser creates a unique symmetrical public key and sends it to the server. Once this step is completed, the certification body issues the certificate to the owner of the website.  

Once an SSL session is set up between server and client, both can exchange encrypted data. An attacker cannot read the data that crosses the wire, so you always know that you are talking to the server to which you think that you are actually talking. Client and server communicate via HTTPS, and HTTPS is a secure TLS wrapper.  

One key (public or private) is used to encrypt the data, and the other key is used to decrypt the data. The third key, the so-called session key, is encrypted on your computer with the public key you receive from the website server and shared with the server. The server decrypts this session key when it uses the secret private key.

It prevents hackers from reading or altering the data transferred between the browser and the web server. If a web page is a page, the browser acts as a client and a web server. The web server hosts the files (HTML, audio, video files) and returns them or responds to the client’s request. This is particularly important when browsing something sensitive like an swingers dating site, such as SLS Swingers.

Why Was HTTPS Created?

Security problems with HTTP can be solved by using a secure communication channel called HTTPS. HTTPS keeps your information confidential by using Transport Layer Security Protocol (TSL, also known as SSL) and Security Socket Layer. Netscape included a new protocol called Secure Socket Layer (Secured HTTPS), which is known and used by website operators as HTTP. 

SSL certificates provide an additional layer of security for sensitive data that should not be accessed by third-party attackers. This is particularly important when it comes to the operation of e-commerce websites. Secure third-party certificates encrypt the connection with a level of protection known as an SSL certificate when purchased.  

It is an important protocol for securing and authenticating data on the Internet. HTTP transfer data in hypertext format from the browser to the web server, while HTTPS transmits data in encrypted format. It prevents hackers from reading or altering the data transferred between the browser and the web server.

How Do I Use HTTPS On My Site?

To prepare a web server to accept an HTTPS connection, an administrator creates a public key certificate for the server. The certificate is signed by a trusted certification authority, and web browsers accept it without warning.

Popular web servers such as Apache, Nginx and IIS as well as web site controls such as CPanel and Plesk support HTTPS, so you don’t need to develop or install custom software for HTTPS communications. All you need to do is install an SSL certificate on your site and update the configuration of your site to use HTTPS. Once your website is created, you can easily switch from HTTP to HTTPS, even if you did not do so at the right time.  

If you are interested in a new or up-to-date website using HTTPS, we can support you throughout the purchase process of a certificate to ensure that incoming HTTPS links continue to work.   

If you need to back up your website, it is quick and easy to request and install an SSL certificate. Although the web community has adopted TLS terminology, you will still see certificates called SSL certificates for simplicity. This means that if you believe you are installing a so-called SSL certificate, you are more likely to use the most up-to-date and secure protocol. 

Emergency Deactivation System (EDS)


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Emergency Deactivation System

What is the Emergency Deactivation System and when do I need it?

The EDS is a real emergency tool. We do not expect many users to ever have to use it during normal usage of Ciphire Mail.

The circumstances under which you have to choose this option mostly involve dataloss on your local computer, loss of your computer or similar situations in which you cannot access your account data through normal use of Ciphire Mail anymore. (For example you just deleted your harddisk without uninstalling Ciphire Mail and deactivating your accounts).

How do I deactivate my certificates using the EDS?

  • Open the Emergency Deactivation System page.
  • Enter the email address of the account you want to deactivate in the first form field.
  • In the second field, enter the passphrase you used to originally create the Ciphire account for the given email address (or the passphrase that was active the last time your renewed the Ciphire account). Please make sure to enter the passphrase correctly. You will not be notified about incorrect entries.
  • Once you have filled in all the required fields, press the [Send] button to send the deactivation request.

You should now receive an email from the Emergency Deactivation System with:

Subject: Ciphire: Emergency Revocation in progress.

This email indicates that the EDS has verified the data you entered and has invoked the final deactivation procedure. If you do not receive this email within one hour, you may have mistyped your account address or passphrase. You can at any time return to the webpage and retry the EDS.

Once your certificate has been deactivated a confirmation message from the Ciphire Certification Authority will be sent to you.

Subject: Ciphire: Revocation succeeded.

This might take up to one hour, but normally takes just a few minutes.

IMPORTANT NOTE:

After you deactivated your account, you have to wait two hours to secure the same account address again. This waiting time is an essential part of the Ciphire Security System and can not be circumvented.

Public Key Cryptography & Ciphire Mail


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Public Key Cryptography

The following document contains basic information on crypto – short for cryptography – and a general introduction to Ciphire Mail. Both are intended for non-technical users. Advanced users may wish to read Niels Ferguson and Russ Housley’s Technical Review of Ciphire Mail.

Introduction to Public-Key Cryptography

Ciphire Mail uses what is known as “public key cryptography” to secure email communications. Whitfield Diffie and Martin Hellman invented public-key cryptography in 1976. For this reason, it is sometimes called Diffie-Hellman encryption. It is also called asymmetric encryption because it uses two keys instead of one key. The one key model is called symmetric encryption. But let’s get back to the two keys.

Ciphire Mail uses the public [two] key system. It has been thoroughly tested by the scientific and information security communities and has become an industry standard. As a Ciphire user, you own a key pair. Your private key is secret and is stored securely on your computer. Your public key, on the other hand, is made available to anyone who wants to communicate with you. It is accessible to all Ciphire users through a central directory – something like a very secure telephone book – managed by Ciphire Labs.

To guard your security, it is crucial that the central directory publishes only authentic and non-compromised public keys. Here’s the important bit. When someone wants to send you an encrypted message he uses your public key. You receive the jumbled message and decrypt it with your private key. Public key encrypts, private key decrypts. Simple. But what if you wanted to send a confidential message to someone and you were duped into using the wrong (or fake) public key? Your deceiver could then decrypt your encrypted message using his private key, read it, possibly change it, pass it along, and you would be none the wiser. This is why valid public keys are absolutely essential to secure communications.

Accordingly, your public key will go through a number of checks and verifications at Ciphire before being recognized as valid and published on the directory. This is why we use the term “certificate” to refer to the document containing your verified public key in the Ciphire Certificate Directory. So when your friend – who is also a Ciphire user – writes an encrypted email to you, her Ciphire Mail client will use your public key (available in the Ciphire Certificate Directory) to encrypt her message to you. When you receive the message, your Ciphire Mail client decrypts it with your private key. This all happens seamlessly in the background. Ciphire Mail does all the heavy lifting for you.

Note that anybody using Ciphire Mail can write an encrypted email to you, because all system users have access to your public key. But you are the only person able to read these emails because you are the only person who has the matching private key needed to decrypt them. So you can be certain that the email was exchanged in full privacy without anybody reading it along the way. When your correspondent digitally signs his message to you, his Ciphire Mail client uses his own private key to authenticate the email. When you receive the email, your Ciphire Mail client gets your correspondent’s certificate, containing his public key from the Ciphire Certificate Directory, and verifies his digital signature. Again, Ciphire Mail does all of this automatically without interrupting your normal email routines.

Since the person corresponding with you is the only person who has access to his private key, he is the only one who can digitally sign his email. Therefore, you can be sure of the identity of the sender as well as of the integrity of the message.

Please Note

In the rest of the document, it will be assumed that you will run your Ciphire Mail client with the default settings.
Installation

Private users and non-profit organizations can download Ciphire Mail from www.ciphire.com free of charge. Simply choose the version corresponding to your operating system (Windows, Linux or Mac) and download the program.

Next, run the installer and follow the instructions. When the installation is completed (you will be notified), you need to restart your computer (Windows) or to relogin to your session (Linux and Mac OS X).

Doing this will start Ciphire Mail automatically. The next step is to initialize your software, which is also straightforward.
Initialization

Make sure you are connected to the Internet to initialize Ciphire Mail.

You just need to type your email address that you want to secure, and choose a short passphrase. Make it memorable, because you’ll have to remember and enter this passphrase every time Ciphire Mail is started (typically, when you start your computer). The software then creates your keys and stores them encrypted on your computer. One last thing. Don’t write your passphrase down on a post-it note and stick in on your monitor or some other obvious place. You wouldn’t leave your house key with a big sign pointing to it on your front porch. This is pretty much the same thing.

Your Ciphire Mail client automatically starts the certification process. You won’t need to perform any manual action. The certification process is a series of verifications and identification exchanges between your Ciphire Mail client and the remote Ciphire Infrastructure. During this process, you will receive an email notifying you that your request is being processed. When all security checks have been successfully completed, your certificate is then declared valid. It is stored and shared in the central Ciphire Certificate Directory and it is ready for use. A second email will notify you of this.

Ciphire Mail has now secured your email address. You can send and receive encrypted and digitally signed emails. Cool, huh?

How your Ciphire Mail Client Works

Before installing Ciphire Mail on your computer, your email client (Outlook, Eudora, etc.) would directly connect to your email server (at your company, your private email provider, etc.) to send and receive emails.

Now, your Ciphire Mail program resides on your computer – between your mail client and your email server – to intercept all the email-related connections. This way, your Ciphire Mail client can manage all your incoming and outgoing messages: it encrypts, decrypts, signs, and verifies signatures as needed. You now have your very own email security servant.

However, nothing changes for you as an email user. All these cryptographic actions are performed transparently, meaning that you do not need to change your mailing routines. You can send and receive emails exactly as you did before, only now they will be secured.

Sending an Email

How you do it

You write an email as you normally would from the address you have secured with Ciphire. You do not need to learn any new steps or secret handshakes since your Ciphire Mail client handles all cryptographic actions automatically.
What happens in the background?

Instead of traveling to your mail server the message is redirected to your Ciphire Mail client. From that point, if the person you’re sending a message to is also using Ciphire Mail, the message will be encrypted and signed. If they are not on the system they will receive an unencrypted message with your digital signature to at least ensure the authenticity of the communication. Whatever the case, the email is then handed over to your mail server and sent normally.

Signing an email

By default, all your outgoing emails are digitally signed. To digitally sign your email the program uses your private key which in turn authenticates your original message. Digitally signing your email allows the recipient(s) to make sure that you were actually the sender of the email, and that the email is received in its original, non-tampered form.

Encrypting an email

The program examines the email addresses of the recipient(s) of your message. For each recipient, the program sends a request to the central Ciphire Certificate Directory for a valid certificate belonging to the recipient. At this point, there can be two answers from the Ciphire Certificate Directory:

No: the recipient does not have a valid Ciphire certificate in the central directory. In this case, the message is sent unencrypted to this recipient.

Yes: the recipient has a valid active certificate. In this case, your Ciphire Mail client retrieves and verifies it. The program then uses the certified public key of the recipient to encrypt the email to this recipient.

Receiving an Email

How you do it

Just as with sending emails, receiving emails with Ciphire Mail does not require any change in your mailing routines.
What happens in the background?

Instead of traveling directly from your mail server to your mail client, incoming messages are redirected to your Ciphire Mail client. The program decrypts incoming messages and verifies their signatures when needed. The processed emails are then displayed in your inbox normally.

Decrypting an email

When you receive an encrypted mail, your Ciphire Mail client detects it automatically. It uses the locally stored private key corresponding to your email address to decrypt the message. Once the decryption is done, Ciphire Mail checks whether the message carries a digital signature to verify.

When you receive an email that is not encrypted, Ciphire Mail directly looks for a digital signature to verify.

Verifying a digital signature

Senders need to have a valid Ciphire certificate in order to sign their messages. When your Ciphire Mail detects a digital signature, it retrieves the certificate of the sender from the central Ciphire Certificate Directory. With the public key contained in the certificate, Ciphire Mail can verify the signature, hence the identity of the sender and the authenticity of the message.

If no digital signature is detected, the email is directly handed to your email client.

Reports and Mail Tags

Security Reports

To inform you on the level of security of each email, your Ciphire Mail client automatically adds tags to your emails. By default, these tags are placed at the end of the subject line of each email. Possible tags are:

  • [u]: the message was neither encrypted nor signed,
  • [encrypted]: the message was encrypted but not signed,
  • [signed]: the message was signed but not encrypted,
  • [ciphired]: the message was encrypted and signed

Capability Reports

You can see who has or does not have a Ciphire-enabled email address among the people with whom you communicate via email. Their name – in the sender’s field for example – will be followed by the tag [c] if they are active Ciphire users. If they are not, nothing will appear behind their name.
Notes

Your Ciphire Mail software offers a large variety of options and specific settings, accessible through the Ciphire Options window. For example, you can add more email addresses to secure; you can set particular encryption or signing preferences; you can choose to get more – or less – security reports, etc.

Whenever there is any action with a certificate, the fingerprint system verifies that the certificate is valid and has not been tampered with. In addition, it performs a chain check of previous certificates.

Ciphire Technology Explained


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Ciphire Technology Explained

From high level overviews to the most granular technical documents, you’ll find Ciphire Mail explained here. If you’re new to email encryption you might want to check out the Introduction and Papers. And for the more technical folks, you’ll want to head over to Expert Reviews. Something for everyone, with more to follow.

Introductory Papers

The following papers explain general aspects of email security and Ciphire Mail and are intended for non-technical users.

  • Public-Key Cryptography and Digital Signatures
    Introduction and definition of the terms public-key cryptography and digital signature.
  • Signing Email Messages
    This introductory document provides information why digital signing of email messages is important.
  • Public-Key Cryptography & Ciphire Mail
    The document contains basic information on crypto – short for cryptography – and a general introduction to Ciphire Mail.
  • How It Works
    Brief introduction how Ciphire Mail works.
  • Trust is transparent – Why Fingerprint Lists Matter
    A short informational paper on the Ciphire Fingerprint System.

Technical Papers

  • Technical Introduction
    A short technical introduction of Ciphire Mail. Intended for technical users.
  • Cryptographic Functions
    An overview of cryptographic algorithms and functions used in Ciphire Mail.
  • Design of the Ciphire Fingerprint System
    A technical description of the Ciphire Fingerprint System and fingerprint-related features of Ciphire Mail.

Expert Reviews

There is snake oil and there is peer review. We work closely with recognized authorities. Advanced users and technical experts will be interested in reading the »Security Design Review of the Ciphire System« by two cornerstones of cryptography and security, Niels Ferguson and Russ Housley. Bruce Schneier’s resistance analysis to insider attacks might also be of interest.

  • Security Design Review of the Ciphire System
  • Analysis of the Ciphire System’s Resistance to Insider Attacks

Email Security Essentials


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Email Security Essentials

What is Public-Key Cryptography?

There are several approaches to protecting the privacy and integrity of messages in transit, especially for sensitive messages floating around on adult search sites. Public-Key Cryptography (PKC) is the most common and secure technology in use today. It is based on asymmetric algorithms that generate two separate but mathematically related keys. The public key (which, as the name suggests, is publicly available) is used to encrypt data. The corresponding private key signs and decrypts data messages and is known only to and used only by the key owner.

What is a Digital Signature?

Digitally signed emails prove to the recipient of the email, that the sender sent exactly this content. Emails are signed with the sender’s private key, and the signature is then verified by the recipient using the publicly available public key of the sender. Signing is mostly used to assure that noone can unrightfully claim to be the sender of a certain message. Especially when it comes to sensitive data this can be essential. Signing can also be used as a means against phishing and similar fraud. See how Secure email can help SEO

Benefits of Ciphire Mail


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Benefits of Ciphire Mail

Ciphire Mail is the first transparent email encryption system that allows everyone to secure their communications without a steep learning curve. New users only need to download and install the client and provide their email address. Everything else will work as before. No key exchanges, no delays, no new routines.

  • You do not need to manually distribute your public key to your communication partners, Ciphire Mail does this for you.
  • You do not need to manually start decrypting encrypted messages or attachments – they arrive decrypted and checked in your email program.
  • Ciphire Mail checks for you if you can communicate securely with a specific communication partner – no additional effort for you.
  • Ciphire Mail also signs your emails and protects you against identity theft – read why you should sign your emails

 

Ciphire Mail – spy-proof email for everyone!

Verify Ciphire Signature


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Verify Ciphire Signature

This tool allows you to verify the validity of a Ciphire secured mail you received.

Please copy and paste either the complete source of your mail or the body of any text mail into the field below. Make sure this includes the complete Ciphire signature and click on “Check the signature in this email” to check:

Notice: If you want to verify an HTML mail (the signature is in a grey box), you have to paste the source of the HTML or of the complete email (usually this is called “Message Source”, “Show Original” or something similar). Pasting the text alone will not work correctly.

Ciphire Mail Changelog


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Ciphire Mail Changelog

Version 1.2.47 (Release Date: 30 March 2006) +

  • More robust handling of corrupted messages
  • Fixed issue with handling of private keys
  • Windows: Better support for Microsoft Outlook

Version 1.2.42 (Release Date: 20 March 2006) +

  • New Ciphire proxy protocol for faster certificate and data lookups
  • Enhanced failover of Ciphire proxies in case of network problems
  • Enhanced caching of lookup responses
  • New signing option “Sign if encrypted” available as a global setting and as a per recipient setting
  • Support for SOCKS 5 proxies in order to access Ciphire servers/proxies (hostname and port number can be configured in the Ciphire Mail Options using Expert mode)
  • New certificate and key handling engine providing better performance and more detailed reporting about security warnings related to certificate validation.
  • Improved and faster account creation. Except for the challenge email that is used to verify the email address, all steps are now performed via a direct connection to a Ciphire server.
  • More detailed reporting about security warnings encountered while checking certificates and email messages. Instead of pop-ups, all security warnings are added to the body of the email message. Major security warnings are added to the top of the message while minor security warnings are added to the bottom. In addition, the subject report is set to “[Ciphire-warning]” or “[w]” respectively.
  • When receiving emails that cannot be verified because of any transient errors (e.g., network problems) the user now has the choice of receiving the messages in unverified form or to try again later.
  • New “individual address settings” to define if messages from a specific sender or domain are supposed to be encrypted or signed. If a message does not match the expected security status of a message a warning is added to the message.
  • New mechanism to export accounts via email using subject enforcer “x!” followed by account address (e.g., “x!alice@example.com”). Account data can be exported and send to any email address. If possible, Ciphire Mail will use Ciphire Mail encryption to secure the email messages. If this is not possible the user has to provide a password for securing the message. Old export messages created with Ciphire Mail 1.1 can still be imported, but not vice versa.
  • Enhanced support for passphrases containing Unicode/UTF-8 characters. However, this is still not recommended as Unicode characters may not work correctly when using the web-based Emergency Deactivation System to deactivate a Ciphire account.
  • Additional X-Ciphire headers in message header to allow mail clients and other third-party software to display status information about the message. In addition to “X-Ciphire-Report” these headers are X-Ciphire-Warning (if there was a warning), X-Ciphire-Encrypted-By, X-Ciphire-Encrypted-To, X-Ciphire-Signed-By, X-Ciphire-Signed-To, X-Ciphire-Signature-Time (ISO 8601 formatted timestamp).
  • New mode “Minimal” for automatic software updates
  • New mode “Extended” for fingerprint list checking
  • Enhanced Unicode support
  • Enhanced uninstallation mechanism
  • New format for account export files and account database files. Old files from Ciphire Mail 1.1 are still supported, but not vice versa. (Please note that you should avoid reverting your installation to an old 1.1 version. All accounts that have been created with 1.2 are not converted to the old 1.1 format, i.e., they would get lost. If you revert your installation, please delete the files “priv.db”, “priv.db.bak”, and “auth.db” from your Ciphire user directory, otherwise upgrading to 1.2 at a later time would not work correctly.)
  • Enhanced handling and processing of messages getting stored in the Ciphire Mail message queue.
  • Enforce certain limits on how many MIME parts are parsed in an email message.
  • Added workaround for mail clients and servers that do not handle messages with very large message headers correctly
  • More robust handling of non-RFC-compliant email messages
  • Linux: Syslog logging can be turned off completely. In order to do this add the configuration option “TR_SYSLOG=off” to “ciphire.conf”.
  • Windows: fixed failures when reactivating Ciphire Mail via tray icon
  • Various minor localization fixes
  • Various minor changes and bug fixes

Version 1.1.15 (Release Date: 14 September 2005) +

  • Added workaround for some mail server software that delivers invalid or corrupted email messages
  • Windows: minor changes to uninstaller
  • Mac: online help has been fixed
  • Linux: various localization fixes
  • Various minor changes

Version 1.1.9 (Release Date: 5 September 2005) +

  • Better handling of Ciphire signatures (non-western languages)
  • Internationalization: French (beta) available now
  • Additional encryption modes for individual recipient settings
  • Improved user interface
  • Queued mail issue resolved
  • Easier handling of software updates
  • More userfriendly uninstaller
  • Many minor improvements and bug fixes

Version 1.0 (Release Date: 28 June 2005) +

  • First official release of Ciphire Mail

Version 0.90.19 (Release Date: 23 June 2005) +

  • Cleanup of logging and pop-up messages
  • Windows: Bug fix for tray icon handling during startup
  • Mac: Bug fix for automatic software update

Version 0.90.7 (Release Date: 15 June 2005) +

  • Cleanup of logging and pop-up messages
  • Bug fixes in message log application
  • Bug fixes for tray icon animation
  • And some other minor bug fixes

Version 0.90.5 (Release Date: 2 June 2005) +

  • Minor bugfixes

Version 0.90.3 (Release Date: 24 May 2005) +

  • Minor UI improvements
  • Improvement in signature handling
  • Mac: IMAP fix for Apple Mail (Tiger)

Version 0.90.2 (Release Date: 19 May 2005)

  • New and improved signature format (not backwards compatible with older versions)
  • Customizable signature text
  • Enhanced handling of multiple signatures
  • Redesign of the complete user interface
  • Easier account creation wizard
  • Clean-up of Ciphire options (simple mode)
  • Virus check support for decrypted messages (write to disk)
  • Improved preview of message with IMAP4 and POP3
  • Support for Ciphire gateways and domain certificates
  • Windows: Native Windows tray icon
  • Windows: Option to deactivate Ciphire Mail
  • Outlook: better handling of large encrypted messages
  • Many bugfixes, minor improvements and changes

Version 0.11.29 (Release Date: 03 Mar 2005) +

  • Less intrusive defaults for incoming mail markup
  • Configuration to only mark secured/signed messages
  • Speed improvements when scanning big IMAP folders
  • Opening options screen without active key possible
  • Mac: Menu icon is disabled until Ciphire Mail is running
  • Mac: Eliminated broken floating icon
  • Mac: Animation fix for Mail.app
  • Mac: Optimisation for automatic software update
  • Mac: Multiple user handling improved
  • Windows: Explanation for manual upgrade added: First uninstall
  • Several minor bugfixes

Version 0.11.11 (Release Date: 19. Feb. 2005)

  • Improved first popup after installation Add/Import/Wait
  • Mac: improved installer
  • Mac: improved activity icon handling with mail.app
  • Mac: optimized crypto libraries, factor 6x speedup for encrypted/signed emails

Version 0.11.6 (Release Date: 17. Feb. 2005)

  • Smart system mail handling on windows might have caused receiving the same mail multiple times – fixed
  • Smart system mail handling, especially for IMAP, improved
  • Integrity check tuned to only run during software updates
  • Mac: Startup time optimized
  • Mac: Some fixes for new installer and layout

Version 0.11.0 (Release Date: 11. Feb. 2005)

  • Tagging of outgoing emails disabled by default
  • SMTP parsing improved for exotic MTAs
  • SMTP timeout prevention improved
  • Queued mail problem in SMTP authentication fixed
  • A »remember passphrase« feature has been added
  • Passphrase timeout can be configured
  • Fixed »Cancel« button behaviour of passphrase popup
  • Major rework of software update system
  • Software update is not anymore instantaneous
  • Tagging of incoming emails with IMAP4 was fixed
  • Added X-Ciphire-Report header, for sorting/filtering
  • Some POP3 parsing fixes for exotic MTAs
  • The 2h delay on uninstall was removed
  • Uninstallation system revamped
  • New/changed SSL/TLS certificates from mail server are now shown
  • Windows: Icon behavior has been vastly improved
  • Windows: works now with McAfee and EZ Anti-Virus
  • Windows: network redirector mechanism further improved
  • Windows: will now detect network hickups in drivers on the fly
  • Linux: new installer supporting more platforms
  • Linux: improved support for automated software updates
  • Mac: new installer
  • Mac: full support for automated software updates

Version 0.10.51 (Release Date: 25. Jan. 2005)

  • 4x speedup for IMAP folder operations
  • fixed another Yahoo SMTP related problem
  • SSL .mac and Exchange issue fixed
  • improved integration with other applications
  • Mac: reduced CPU usage dramatically, also no spikes in CPU usage anymore unless you are using Norton applications

Version 0.10.49 (Release Date: 21. Jan. 2005)

  • fixed Yahoo SMTP problem, if you applied the ‘Yahoo Fix’ workaround before, please undo it again
  • improved SMTP timeout prevention
  • fixed a problem with mail handling when loosing the network connection while sending
  • fixed multiple mail server names problem. GMX/T-Online smart mail handling improved.
  • BCC signing bug fixed
  • IMAP delete success email without user delete(fix)
  • replaced “GMT” by “UTC” in email signatures
  • disable the ‘uncheck’ remove old sigs in the options for now
  • the HELO localhost problem, mostly experienced with thunderbird
  • fixed a pop/imap SSL problem with MS Exchange
  • Linux: improved installer, will need more work
  • Windows: adding wow.exe in the conf file

Version 0.10.45 (Release Date: 13. Jan. 2005)

  • and yet another timzone issue fixed, this time on linux, right before midnight, in the GMT zone

Version 0.10.43 (Release Date: 12. Jan. 2005)

  • an issue with southern hemisphere daylight-saving timezones on Windows XP during account/key creation was fixed
  • now as well working around an OL2002 problem where in SMTP the ciphire client was answering too fast for OL to notice

Version 0.10.41 (Release Date: 11. Jan. 2005)

  • a stall when using the ‘Wait’-option on initial install with IMAP was fixed
  • a rare MAC OS X issue with timezones letting account/key creation fail was fixed

Version 0.10.39 (Release Date: 11. Jan. 2005)

  • 10ms delay in smtp dialog to counter an internal Outlook2002 problem
  • text change for obsolete chal. mails
  • text change for secure new account popup yes/no/never
  • new skin for windows installer
  • minimize button on panel popups
  • Mac: fixed very rare installation problem

Version 0.10.26 (Release Date: 5. Jan. 2005)

  • a problem with the LITERAL tag in IMAP was fixed
  • a rare crash on empty quoted printable mails was fixed
    on MAC
  • ciphire-msg will use less mem and cpu now

Version 0.10.22 (Release Date: 23.12.04)

  • signature text was shortened

Version 0.10.13 (Release Date: 21.12.04)

  • initial 0.10.xx series release

Notes:
(+) Version is available via automatic update

Ciphire Mail 1.0 available


Warning: Undefined array key "instagram_options" in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Warning: Trying to access array offset on value of type null in /home/ciphirecom-2183/public_html/prod/wp-content/plugins/social-buttons-pack/includes/sclbttns-nstgrm.php on line 70

Ciphire Mail 1.0 available

Gold Version of the First Free, User-friendly Email Encryption Tool is Available for Download

Munich, June 28, 2005 – After the successful completion of our beta testing we are proud to announce the availability of version 1.0 of Ciphire Mail for Windows, Linux and Mac users.

Ciphire Mail is a free, easy-to-use email security product that protects email privacy, prevents identity theft, and minimizes exposure to email scams such as spoofing. The product is available for free for consumers and non-profits and can be downloaded here.

Ciphire Mail delivers secure email communication and protects sensitive data from access by third parties. Users are able to send personal information without worrying about security breaches. The emails are encrypted and decrypted automatically in the background without disrupting the user. Additionally, emails are digitally signed so that the sender is authenticated and email recipients can be assured of their authenticity. Ciphire Mail is very easy to use and requires no technical knowledge.

With Ciphire Mail Client, acquiring the ability to seamlessly encrypt and sign your email messages is a simple process. “Once installation is completed, sending secure email is as easy as sending any other email, as Ciphire Mail completely automates the encryption and signature processes,”said Dr. Richard Reiner, CTO, FSC. Corp & Assurent Secure Technologies. “Ciphire Mail is a significant step forward in the state of the art for email security. Enterprise and public sectors organizations should eagerly anticipate the release of the Ciphire Mail Gateway product. Individuals need not wait, and can benefit immediately from the convenience of the free Ciphire Mail Client.”

Ciphire Mail was first released in a Beta version January 2005. Since that time, we have incorporated consumer feedback into Ciphire Mail to provide a higher level of functionality, ease-of-use and compatibility with other computer security programs.

Ciphire Mail runs on Windows 2000/XP, Linux, and Mac OS X, and supports popular email programs like Outlook, Eudora and Mozilla Thunderbird. It is fully compatible with computer security programs from McAffee (NYSE: MFE) and Computer Associates’ (NYSE: CA) eTrust, among others.

Ciphire Mail can be downloaded today at www.ciphire.com/download.

The product is free of charge to home-users, non-profit organizations and the press.

Ciphire Mail 0.11 released

We are pleased to announce the release of Ciphire Mail 0.11.
If you are using Ciphire Mail on Linux or Mac, please read the important notes at the end of this announcement.This version of Ciphire Mail is principally a bug fix release, but also introduces several new features:

  • A »remember passphrase« feature has been added
  • Passphrase timeout can be configured
  • Major rework of the automatic software update system
  • Added X-Ciphire-Report message header to ease sorting and filtering
  • Improved SMTP/POP3/IMAP4 protocol handling
  • New and improved Uninstaller
  • New/changed SSL/TLS certificates from mail server are now shown
  • Windows: Icon behavior has been vastly improved
  • Windows: works now with McAfee and EZ Anti-Virus
  • Linux: new installer supporting more platforms
  • Mac: new installer
  • Mac: full support for automated software updates

More details are available from the changelog, you can download Ciphire Mail here.

We consider 0.11 to be the best version of Ciphire Mail available and strongly recommend that users of older versions upgrade as soon as possible.

If you are using the automatic software update feature of Ciphire Mail, you will receive a pop-up informing you about the availability of the new version within the next few days.

ATTENTION LINUX USERS:

Because of the new installer and X11 startup support, you have to update to the new version manually. To do this, please uninstall the system files of the old version first and then install the new version, as described on the Linux download page:

http://www.ciphire.com/linux_download.html
ATTENTION MAC USERS:

This will be the last time that you have to update Ciphire Mail manually. The new version includes full support for automated software updates. It is mandatory to uninstall the old version first. Then install the new version from the download page by following the instructions in the installation guide:

http://www.ciphire.com/mac_download.html