SlideShare a Scribd company logo
1 of 16
Why encrypt your emails?
Why encrypt your emails?
Most people only protect their emails while
they are in transit (i.e. being sent from your
internet browser to the recipient’s browser).
But emails live forever and data should be
protected at all times.
The only way to do this is to use end-to-end
encryption.
The idea of end-to-end encryption
The reality of end-to-end
But it doesn’t have to be this
way…
End-to-end can be:
• Easy
• One-click
• Integrated with your existing email account
• Free
• On your smartphone
Say “hello” to Jumble
No technical wizardry required:
• Easy
• One-click
• Integrated with your existing email account
• Free
• And on your smartphone
Sign me up!
Register for FREE!
How to install Jumble
(Explain it to me like I’m a kid)
Step 1: Do you have Gmail?
Yes
go to Step 2 on the
next slide
No
Create one!
Step 2: Using Chrome?
Yes
Go to Step 3
No
Get Chrome!
Step 3: Register
Register for FREE!
Note: you’ll be brought to Jumble’s site and asked
to:
• Give us your Gmail address; and
• Create a password.
Step 4: Install Jumble
Go to the Google Chrome store
Click the button
You will now see the Jumble extension in
your Chrome browser
Step 5: Login to Jumble
• Click the logo in your Chrome browser
• The window below will pop open for you to
log in to.
Enter the:
Gmail address you registered; and
The password you created in Step 3
Step 6: Protect your data
You’re done!
Compose an email and select
the newly added
button to encrypt your data.
Note: You can still send emails
that are not encrypted – Jumble
gives you the choice…
How to protect your emails

More Related Content

Similar to How to protect your emails

Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activistsSanjana Hattotuwa
 
Snip it before you ship it
Snip it before you ship itSnip it before you ship it
Snip it before you ship itWilbert Heinen
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and ThyselfiLinkoln Meetup
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationChurch of the Epiphany
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet securityMoses Ngeth
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-finalroutbisu
 
Microsoft DigiSeniors Module: Computing with Confidence
Microsoft DigiSeniors Module: Computing with ConfidenceMicrosoft DigiSeniors Module: Computing with Confidence
Microsoft DigiSeniors Module: Computing with ConfidenceSmart Chicago Collaborative
 
Union University: Making Teaching & Learning Mobile
Union University: Making Teaching & Learning MobileUnion University: Making Teaching & Learning Mobile
Union University: Making Teaching & Learning MobileMichael M Grant
 
Using Mobile Devices with Teaching & Learning
Using Mobile Devices with Teaching & LearningUsing Mobile Devices with Teaching & Learning
Using Mobile Devices with Teaching & LearningMichael M Grant
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 
Self help class gmail 5 review 031914
Self help class gmail 5 review 031914Self help class gmail 5 review 031914
Self help class gmail 5 review 031914SnowSugar Video
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11William Mann
 
eMail 101 (4) Class for Self help Virtual Senior Center
eMail 101 (4) Class for Self help Virtual Senior Center eMail 101 (4) Class for Self help Virtual Senior Center
eMail 101 (4) Class for Self help Virtual Senior Center SnowSugar Video
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 

Similar to How to protect your emails (20)

Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
Snip it before you ship it
Snip it before you ship itSnip it before you ship it
Snip it before you ship it
 
Email
EmailEmail
Email
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and Thyself
 
Online Security
Online SecurityOnline Security
Online Security
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account information
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet security
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-final
 
Identity toolkit
Identity toolkitIdentity toolkit
Identity toolkit
 
Microsoft DigiSeniors Module: Computing with Confidence
Microsoft DigiSeniors Module: Computing with ConfidenceMicrosoft DigiSeniors Module: Computing with Confidence
Microsoft DigiSeniors Module: Computing with Confidence
 
Union University: Making Teaching & Learning Mobile
Union University: Making Teaching & Learning MobileUnion University: Making Teaching & Learning Mobile
Union University: Making Teaching & Learning Mobile
 
Using Mobile Devices with Teaching & Learning
Using Mobile Devices with Teaching & LearningUsing Mobile Devices with Teaching & Learning
Using Mobile Devices with Teaching & Learning
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Personal use
Personal usePersonal use
Personal use
 
Self help class gmail 5 review 031914
Self help class gmail 5 review 031914Self help class gmail 5 review 031914
Self help class gmail 5 review 031914
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
eMail 101 (4) Class for Self help Virtual Senior Center
eMail 101 (4) Class for Self help Virtual Senior Center eMail 101 (4) Class for Self help Virtual Senior Center
eMail 101 (4) Class for Self help Virtual Senior Center
 
Emailbasicsclass
EmailbasicsclassEmailbasicsclass
Emailbasicsclass
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
Email
EmailEmail
Email
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

How to protect your emails

  • 1.
  • 3. Why encrypt your emails? Most people only protect their emails while they are in transit (i.e. being sent from your internet browser to the recipient’s browser). But emails live forever and data should be protected at all times. The only way to do this is to use end-to-end encryption.
  • 4. The idea of end-to-end encryption
  • 5. The reality of end-to-end
  • 6. But it doesn’t have to be this way… End-to-end can be: • Easy • One-click • Integrated with your existing email account • Free • On your smartphone
  • 7. Say “hello” to Jumble No technical wizardry required: • Easy • One-click • Integrated with your existing email account • Free • And on your smartphone
  • 9. How to install Jumble (Explain it to me like I’m a kid)
  • 10. Step 1: Do you have Gmail? Yes go to Step 2 on the next slide No Create one!
  • 11. Step 2: Using Chrome? Yes Go to Step 3 No Get Chrome!
  • 12. Step 3: Register Register for FREE! Note: you’ll be brought to Jumble’s site and asked to: • Give us your Gmail address; and • Create a password.
  • 13. Step 4: Install Jumble Go to the Google Chrome store Click the button You will now see the Jumble extension in your Chrome browser
  • 14. Step 5: Login to Jumble • Click the logo in your Chrome browser • The window below will pop open for you to log in to. Enter the: Gmail address you registered; and The password you created in Step 3
  • 15. Step 6: Protect your data You’re done! Compose an email and select the newly added button to encrypt your data. Note: You can still send emails that are not encrypted – Jumble gives you the choice…

Editor's Notes

  1. Whether you realize it or not emails are like postcards!   Just as a postcard can be intercepted and read as it’s being sent through the postal network….so can an email. They can even be edited.
  2. You may have heard of 256-bit AES and 2048 bit RSA keys; You may have heard about the time complexity and effort taken to crack a key; Or key exchange; or Or algorithms;
  3. Existing end-to-end solutions are: Hard; Frustrating; and Time consuming.
  4. Just like you don’t need to be a mechanic to drive a car we believe you don’t need to be a computer scientist to send encrypted emails.
  5. You don’t need to know all this because sending an encrypted email can be as simple as clicking a button.
  6. Click on the link https://jumble.io/privacy#register to register with Jumble for FREE (copy & paste this link in to your internet browser)
  7. We’re not saying you’re a kid – just that we’ve made our tutorial as simple as possible ;) You can watch a video instead if you prefer at https://www.youtube.com/watch?v=MDnPY6QJbXA (copy & paste this link in to your internet browser)
  8. More email providers coming soon! Create a Gmail account at https://accounts.google.com/SignUp?continue=https://accounts.google.com/ManageAccount (copy & paste this link in to your internet browser)
  9. More web browsers coming soon! Get Chrome at http://www.google.com/chrome/ (copy & paste this link in to your internet browser)
  10. Click on the link https://jumble.io/privacy#register (copy & paste this link in to your internet browser) to register with Jumble for FREE
  11. Get the Jumble extension at https://chrome.google.com/webstore/detail/jumble/fjiggkonckoakfpobglkbckakfgcnidh (copy & paste this link in to your internet browser)
  12. Nearly there..
  13. That’s it!