You should send this to some reputable journalists.
If you are in Myanmar for fucks sake stop using the clear net, please get on the dark net.
Once on the dark web there are plenty of legitimate news sources who have onion sites, you can drop off your documents, testimony, and video there.
Make sure you set up an anonymous email and use PGP encryption for all communications.
https://www.openpgp.org/software/
Be safe, take care, report what you can.
They are OpenPGP messages, which can be used to encrypt messages to be decrypted by a private key, somewhat commonly used in tech communities (such as Debian) to sign messages or software cryptographically. It's a technology borne out of the cypherpunk community of the 90s with the promise of circumventing the proposed mandated clipper back door.
This looks like an attempt at a high school level invisible marker subreddit among a few friends. Or it could be Russians.
You have to configure your Yubikey to hold your OpenPGP keys and then you may want to check gpg in Linux and Gpg4win for Windows. https://www.openpgp.org/software/gpg4win/
The web site is prohibiting keys from "openpgp.js", a javascript implementation of OpenPGP. They are not prohibiting all OpenPGP implementations.
It looks like they're prohibiting PGP keys that were likely to have been generated or stored on a server rather than by you on your personal computer. Most local applications should create usable keys.
Kleopatra uses GnuPG, so it should be fine. https://www.openpgp.org/software/kleopatra/
https://www.openpgp.org/software/kleopatra/
​
Kleopatra is the only thing that comes to mind, you should try that out and see if it does what you need.
Unless it's encrypted on disk ( it isn't), anyone with administrative access can look at the mail boxes and read your mail.
The thing is, you're not special enough for the IT staff at the host to care. They have better things to do.
Even if one of them did have the time and access to look brazenly at client email, you would be one choice out of how many?
It's not impossible but it's a long shot to be snooped on by your own webhost. Unless you make yourself stick out by being a jackass to support or making an inordinate amount of worthless, time wasting support requests, they don't even know you exist until you don't pay your bill.
Hacking is certainly a larger risk than IT staff.
If you are really that worried, then find a mail provider that encrypts on disk with a public key you provide.
You could, also, just use something like PGP to encrypt mail yourself.
The only thing you can do is use encryption. Almost all email services in this country are monitored by the government, and even if not, your mail is visible to the server administrator. Read up on PGP, and use the strongest encryption method you can.
I am using it. It's pretty straight forward but it does not support iOS yet. I recommend upload your public key to their site so people can send encrypt message to you.
Para de ser paranoico cara. Ninguém tá rodando criptografia com software vendido em caixinha. O OpenPGP tem seu código aberto para escrutínio de todo e qualquer desenvolvedor observar a implementação do AES-256 por exemplo:
Just use an email client that does encrypted email and skip the whole discussion. Note that Mailvelope can do this for webmail as well.
This stuff is all standardized now...
Hello!
Outlook will handle this in the same way as it would any regular email IMAP account.
The end-to-end encryption will have to be done in the user's end.
https://www.openpgp.org/software/
We plan to make some step-by-step instructions to help our users with their PGP keys soon after IMAP is available.
No you don't, it is easy. Install Kleopatraand that's about all you need since you already have Tor.
Keep in mind Tails is considered essential. Tails is very easy to set up on a USB drive.
Not for me, but I was using PGP 2 factor authentication with Dream after Alphabay went down. You need a PGP client. Kleopatra works with Windows if you are not going to install Tails. https://www.openpgp.org/software/kleopatra/
Protonmail has OpenPGP support so is as compatible with other systems as it can get. Of course if you are going to go the OpenPGP way then the email provider no longer matters. Everything happens on the end devices. That's what end to end means. The software:
Also, now that I think about it, I don't think Windows has the luks support to decrypt a USB drive. :-\ I've had success using gpg on individual tar files using Cleopatra on that end. Another nice (free and open) option is veracrypt -- that's available on both Windows and Linux and I've had quite a bit of success with it.
Pretty Good Privacy.
It's a program for encrypting emails, although most people will probably be using a plugin or some variation of OpenPGP instead.
https://www.openpgp.org/software/
The biggest issue most users will have is that it's probably only effective if everyone is using it, otherwise nobody would be able to read your emails, and other emails you receive would still probably be unencrypted.
I'm not seeing where this explicitly says anything that would break the OpenPGP standard (https://www.openpgp.org/about/standard/). Not trying to fight here, but I also am not sure that "not using GnuPG" immediately means a standard has been broken.
Help me understand on this one.
There are a lot of ways to do it but I would Google pgp for windows https://www.gpg4win.org/ There are utilities that can be installed for all operating systems but they have made one called kleopatra that is a GUI for key management https://www.openpgp.org/software/kleopatra/
https://www.openpgp.org/software/kleopatra/
Kleopatra is a gui for openpgp and they have a windows version the last time I looked into it. It also works directly with Thunderbird mail. That or if you feel ok using powershell, GnuPG also has a windows wrapper.