Online Manual >
What is Encryption >
While it is well known that letters can be intercepted and phone lines can be
tapped, it is not so well known that even e-mails can be easily read. In fact
it is commonly believed that the login password provides privacy and
This is not actually so!
Any employee of the Internet Service Provider (ISP) that you you use, can tap
into your e-mail at your end or that of the recipient with the use of fairly
basic equipment. Tapping can also be done by anyone who links up to the dozens
of Internet routers through which your message passes. The mail can even be
accessed by someone at the phone company's office or a hacker who taps in
There are also a number of more sophisticated methods and a wide range of
equipment by which all electronic communication can be intercepted. These are
used primarily by government agencies, but can also be employed by business
rivals and competitors.
Such agencies can also use specially designed softwares that can
automatically search all e-mails and faxes passing through a particular phone
network for keywords, or analyse phone calls digitally. So even if you are using
unlisted numbers, or public call offices and cybercafes, your communication can
be traced and intercepted by picking up commonly used terms or phrases.
Hence, encryption, using AEP PRO software, is the only guaranteed way to
protect your privacy.
Back to the Table of Contents