Private E-Mail MessagesWhy Encryption is So Important
If your email account is hacked, all your emails would be exposed for all to see. If you have some really confidential correspondence you should use Away RJN Cryptography to encrypt and send the emails. Then if the account was hacked all that would be seen is gibberish. Get ahead of the curve with Away RJN Cryptography. This is your opportunity to protect your correspondence from compromise.Government Interception
It is becoming LEGAL for the government to intercept YOUR e-mails. Not to worry if your e-mails are intercepted and you have attached a file with unbreakable encryption!
"We're talking about lawfully authorized intercepts," said Federal Bureau of Investigation (FBI) general counsel Valerie Caproni. "We're not talking expanding authority. We're talking about preserving our ability to execute our existing authority in order to protect the public safety and national security."
The time to protect yourself and your information is NOW! --There are bills before congress that would require all online services that enable communications to be technically capable of complying with a wiretap order.
How to Email an Encrypted Message
Two Easy Steps
Storing Encrypted messages on your computer is commonplace today. The problem is how to send and receive these messages easily and securely without inside knowledge of computer functions.
Away RJN Cryptography is capable of transmitting ANY document you consider Secret by pressing two links.Directions for Emailing Encrypted Messages:
It is a simple two step process:
Uses Mozilla Thunderbird to transmit the fiile.Away RJN Cryptography will insert your Encrypted message into Thunderbird . Download Thunderbird here... it's the best and it's free
You can use it for all your regular - non-encrypted emails.
No Geek Required
Does this sound difficult to you?
No third party Certificates are required.
We have an extensive 24/7 online Help File.
E-Mail questions are answered by our Technical Programming Engineer. Our Customer Service is superb.
Graphic Guided Instructions
Here are the steps to send an Encrypted file:
Automatic App Operation
All the necessary computer generated Encryption and Public Key/Private
Key algorithms are handled internally and automatically
without any manipulations by the Sender or the Recipient.