How Secure Is Your Email Communication?

Email communication is divide into two: sending and access. The protocols related to sending are for the transmission of messages; the ones related to access are for accessing messages in the email account box. The transportation of messages, that is, the transmission of messages between servers , must be done with the SMTP protocol . Other than this, more than one way can be use for the transmission of messages or access to the account box by the remaining users.

What is TLS? Why is TLS Necessary?

Historically, SMTP, which was use for message transmission, and POP3 and IMAP protocols use for telegram database accessing messages, did not work in an encrypt manner. In fact, in the early days of use, authentication was not even require for access made with these protocols. Any client or person with network access could access and intervene in existing messages by sending messages.

Authentication became mandatory over time, but encryption was not. To eliminate the security problems create by this situation, the use of TLS , or Transport Layer Security , was the solution.

To explain what TLS

Does in simple terms; TLS is the operators settle in quickly encryption and authentication process between the communicating pair. Even though all servers start to support TLS after this security measure was introduce, supporting old insecure protocols was mandatory for compatibility with the past. In practice, this result in the mandatory or preferential use of TLS. Eventually, service providers emerge that force users to do this or allow them to use it if they want.

The service provider, who did not want hindi directory to provide secure service in this way, prefer to provide service only on port 143. Similar rules were applie for standard SMTP running on port 587 as SSMTP on port 465, and for POP3 , POP3S on port 995. Of course, the webmail interfaces we all use were offer as a service on port 443 with HTTPS , which has become the de facto standard of the internet , instead of HTTP running on port 80 .

Service providers are currently able to provide both types of access at the same time, depending on the type of service they provide and the demands of the user group. In particular, those with the technology to do this allow adjustments to user preferences. This allows for increase service quality, and security to be tighten or more easily implement by the organizations receiving the service directly.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top