tag:blogger.com,1999:blog-2618029197139250711.post1306060739602836512..comments2024-03-25T03:02:08.418-07:00Comments on Translation Times: Enciphering Web-Based E-MailJudy Jenner and Dagmar Jennerhttp://www.blogger.com/profile/15991071510108619107noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-2618029197139250711.post-20116459829610603782011-10-19T18:20:34.805-07:002011-10-19T18:20:34.805-07:00@Michael: our pleasure and great questions! We wil...@Michael: our pleasure and great questions! We will check with our web guru and get back to you. You are right, it is challenging to find out who is behind the software.<br /><br />@Thomas: duh, you are right, of course it works with Outlook as well -- one just can't drag the icon to the bookmark. Thanks for setting that straight. Could you answer Michael's questions when and if you have a second, please?Judy Jenner and Dagmar Jennerhttps://www.blogger.com/profile/15991071510108619107noreply@blogger.comtag:blogger.com,1999:blog-2618029197139250711.post-58223917720775780382011-10-18T16:38:03.807-07:002011-10-18T16:38:03.807-07:00Since encryption has been historically a cumbersom...Since encryption has been historically a cumbersome procedure, thank you for bringing a simple tool to the attention of your readers – encryption is always better than no encryption.<br /><br />Two caveats: <b>(1)</b> Who are the people behind the tool? What happens to my text when I paste it into a Web interface? The site is strangely quiet about that. Especially with encryption, having the source code available for public scrutiny helps to ensure that there are no unexpected wrinkles. <b>(2</b>, and this is actually a whole different debate) If security is important, isn't the shared-key approach an inherent weakness?Michaelhttp://translaterhis.eunoreply@blogger.comtag:blogger.com,1999:blog-2618029197139250711.post-16489025378242481842011-10-18T13:09:29.252-07:002011-10-18T13:09:29.252-07:00As it is "Copy and paste text" it works ...As it is "Copy and paste text" it works also with Outlook ;-)Thomas Gruberhttps://www.blogger.com/profile/05642512342770899491noreply@blogger.comtag:blogger.com,1999:blog-2618029197139250711.post-14574728814149152872011-10-18T08:02:51.411-07:002011-10-18T08:02:51.411-07:00@Milos: this post wasn't meant to be a compreh...@Milos: this post wasn't meant to be a comprehensive overview of available encryption methods. We just wanted to introduce one tool that we had found. We are sure PGP/GPG is fantastic, too. We will check it out. Thanks for letting us know!Judy Jenner and Dagmar Jennerhttps://www.blogger.com/profile/15991071510108619107noreply@blogger.comtag:blogger.com,1999:blog-2618029197139250711.post-68976237173061828432011-10-18T01:08:20.302-07:002011-10-18T01:08:20.302-07:00Didn't you consider to use PGP/GPG encryption?...Didn't you consider to use PGP/GPG encryption?<br /><br />https://secure.wikimedia.org/wikipedia/en/wiki/GNU_Privacy_GuardMilosnoreply@blogger.com