From a read..
“Last week, I have to communicate with my friend overseas in China. We both were aware that our email communications were being monitored. So, we both were forced to install and use a fully-fledged encrypted email system
Although it appeared to be very secure, it was quite cumbersome to handle. If you are ever faced with the same situation, I am here to introduce you a very simple and easy-to-use approach to encrypt your files and send them to the person you want to communicate with.
Here’s the Kicker: You don’t even need to install any software or sign up to any website in order to use the file encryption service.So, what do I have today in my box? “Otr.to” — an open-source peer-to-peer browser-based messaging application that offers secure communication by making use of “Off-the-Record” (OTR) Messaging, a cryptographic protocol for encrypting instant messaging applications. Otr.to came on to radar just recently as of two months ago. At that time, it included two services: Secure Peer-to-Peer Chat Self Destructing Message
All you need to do is, follow some simple steps given below
Open any web browser from any platform
Visit https://Otr.to website and go to Secure File Sharing option Upload a file and get a link to it
Share that link and encrypted password with your friend you want to communicate When our friend will download the file once, it will automatically self-destruct.
Otr.to is absolutely free and anonymous, which means it doesn’t reveal anybody’s identity to public. Also, Otr.to doesn’t save the keys (password) on its server, as everything it stores on the server is in encrypted form only.
This is something we really need in today’s fast life.
Otr.to could prove to be a great tool for a variety of people, including journalists, businesses and whistle blowers who want to keep their communications instant, private and secure, as it’s not complex like other file and messages encryption software available in the market.
Interesting and I have checked it out the encryption 256 bit, if someone absolutely wanted to crack – say file “A” with enough processing and ram power it can be done. Most people have woken up and realized anything and everything can and presumably is stored somewhere and recorded for later use which when I think of certain situations, it’s a good thing.
It’s not SO the monitoring itself… it is the lack of oversight in who is watching “the watchers?
I would entertain any comments/opinions –