Unfortunately, upgrades to e-mail security don't always happen. One reason is because the new software can be expensive. Such is the case with Security-in-a-Box, a new e-mail security program from TurnKey.
This year we saw the introduction of polystyrene particles to deter mail from being shredded inside a mailing box. Previously, shredders could only shred pieces of paper with a predetermined melting point of about 300 degrees. Researchers at MIT and the Postal Service have been working on a new way to prevent shredding of paper into short-answer announcements. This system uses tiny trash bags, at about the same size as a human hair. When mail is routed through the system, the shredders shred the mail into three random pieces of paper.
TurnKey's Security-in-a-Box
Postal service has always been about security, but more recently, it has been about reducing the risk of tampering. That is part of the reason why the TurnKey system was invented. It uses a pass/fail system for private encryption keys. If someone cuts the wrong key in a cut-over with someone else's private key, it would not be able to be re-used.
The system is not a hardship to use. Users simply need to provide input such as their name, address, SSN, and password. They are then taken through a web site where they provide their information and are granted a one-time code generated from a personal identification number. These codes can be used multiple times. The individual must then enter another code, typically a serial number, which is a three to nine digit ID number that is serialized and stored in case a key is needed for subsequent transactions. In the event an error occurs, it can be used again and voila! The personal codes are not a guarantee of security, but at least it does not provide any.
The sense of security is greatest in using a PIN number for the duplicate key. Of course, it must be a PIN number that is unique for the Post Office. Most PIN numbers have numbers from 0 to 9. If someone has a provisional or reactive key, they will not be able to access the system. When someone else uses a PIN for the key, they are using numbers 0 to 9.
There are software programs that generate codes for keys of different sizes. For example, a key with a 0 large number would be unusable. It would not work even if it were inserted with a 25 key. So, the computer would know to not insert it.
Now, a large majority of keys are postmarks that are used for improving security. A postmark is just a code on a letterhead or other announcing an item that is incoming or outgoing. Some keys are very small, however, and they could be used over and over again within a day. In the case of very small keys, a person may only use a one time to code them. When someone uses a key that is not postmarked and ends up being accidentally left out, they will be given a generic error message and not be able to retrieve any of their files.
There are many different reasons why someone may need to convert codes. Every key logger needs to be secured, and once it is, there should be no way that the information can be accessed without the proper code. Thus, if you do not plan to use your computer for a day, better to wait until the logger is installed. One day is usually all that is needed to convert codes.

0 Comments