That is Easy … just do everything in the previous two chapters … “Computer Security And Privacy” and “Telephone, Voice Over Internet Phone (VOIP), Cell Phone, And Superphone”. Your laptops will be secure, protected, and encrypted. Important and private files will be securely encrypted and stored in a separate secure location from your laptops. You will have secure and encrypted backups. You will have a decoy and clean computer, protected for everyday and travel use. Your Internet browsing will be protected, secure, and private.
If you have a tablet or Superphone, then make it private. Start by registering these devices to a Protected Business Name or a Fake Name that is NOT traceable to your Given Name or your home address.
How do you make your email private?
This is difficult because email has many sides. There’s a sender, a receiver, and maybe multiple receivers for every email. There’s also the email provider for each party to an email. You can’t control what other people do with email you send, let alone what ALL of your email friends do with email both sent and received. You don’t control the email provider either.
RECOMMENDATION: My advice is simple. Keep your emails respectable, responsible, and safe to the point that if anyone were to read any email you send, you would not be embarrassed or placed in any jeopardy. To put it another way, assume your email is read by your worst nemesis and CYA (Cover Your Assets). For those occasions when you need an email to be secure and even self-destruct, read on …
SEND PRIVATE INFORMATION BY EMAIL:
You can send a test email to yourself:
NOTE: To be anonymous, send all encrypted email from a public computer far from home (library or Internet café). Never write a secret message using Microsoft Word, because there is imbedded “metadata” about the document’s author.