VIMI Secure Data Systems

The Foremost Secured Untraceable Data Network Using Military Grade Encryption.

Libertas vs Email
German Flag Spanish Flag French Flag Italian Flag Portuguese Flag Japanese Flag Korean Flag Chinese Flag British Flag

Every time you send an e-mail it passes through a series of computers on its way to the intended destination.

Most of them are owned and managed by internet service providers, although if you use webmail from Yahoo, Google or Microsoft then it may take a different route.

But whoever provides your e-mail, the chances are they are having a look at every message you send or receive.
-BBC Technology commentator Bill Thompson

Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that is an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you are doing and, possibly, what you are saying. That is because it focuses on the header, which discloses source, destination, size, timing, and so on.

A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.

But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.