top of page

Email Interception

Updated: Apr 28

Gold Comet cares about your private communications. One significant threat to email privacy is email interception. Email interception is done through the monitoring of the Internet to read private messages that were intended for other people.

When Internet email was first introduced in 1982, the Internet (as it was to be later named) was a very different place, mostly populated by technical people from a handful of academic institutions like the Advanced Research Project Agency (ARPA). Everyone knew each other; it was more of a close-knit group of people or even a group of Nerds that had no use for security. When they built this first email system, they did not incorporate any kind of digital envelopes to ensure what they wrote was private and only the person they wanted to see the message saw the message. Someone even asked the US Postmaster General if the Post Office wanted to put a stamp on these emails. The Post Office politely declined.





How Does Email Interception Work?

Today, there are many pieces of network equipment that sit on the path over which your message travels across the Internet. These devices can and do decipher and read these emails. Moreover, there are technical tricks, called hacks, that if not adequately countered will allow any third party to have access to these messages.

What can be done to protect yourself and your company against these modern-day threats?

Unlike other solutions, Gold Comet communications never travel across the internet, keeping them private. All communications are kept within the Gold Comet system from the time you log -in to compose a message to the recipient reading your message. With this process, Gold Comet mitigates most of the threats that plague email systems today.


Data Encryption

Any truly secure email system must rely on Data Encryption, both while the data is at rest and while it is in motion. Many of the secure email systems on the market today only do encryption at rest, which is not the answer. You need to look for a system that uses Transport Layer Security (TLS) protocol when your messages are in motion. The latest and most trusted is TLS 1.3. Gold Comet utilizes a unique process by combining their patented encryption system with the most comprehensive encryption algorithms that encrypt each message with a unique, dynamic key with industry standard 256-bit encryption.

You should be asking yourself “How is our messaging solution protecting our private communications.” Here are other factors you should take into consideration when picking a secure messaging solution.


CAPTCHA

A messaging system that employs CAPTCHA for access to web-based email forms can help minimize the impact of automated attacks and lessen your chances of email flooding and Denial of Service (DoS). CAPTCHA distinguishes human access from machine or automated access. This is a proven way of thwarting spam and automated extraction of data from websites. At Gold Comet we use the latest version of CAPTCHA.


Two-Factor Authentication

Also known as 2FA is a type, or subset, of multi-factor authentication and is a method of confirming a users’ claimed identity by utilizing something they know (password) and a second factor being either “something they have” or “something they are”. Something they have can be a PIN sent to another device or email address, while something they are can be a fingerprint, facial recognition or a retinal scan. At Gold Comet we have been using 2FA from the beginning and we believe in keeping your online Communications private between you and the intended recipient.


Domain Keys Identified Mail (DKIM)

DKIM is an email authentication method (which is different from user authentication discussed above) designed to detect forged sender addresses in emails (email spoofing), a technique often used in phishing and email spam. DKIM allows the receiver to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain. It achieves this by affixing a digital signature, linked to a domain name, to each outgoing email message. The recipient system can verify this by looking up the sender's public key published in the Domain Name Server (DNS). A valid signature also guarantees that some parts of the email (possibly including attachments) have not been modified since the signature was affixed. At Gold Comet, we use DKIM on every incoming message.


Whitelisting

Whitelisting is the practice of explicitly allowing some identified entities access to a particular privilege, service, mobility, access or recognition. This essentially stops you from receiving Spam and other nefarious emails. Whitelisting is a better practice than blacklisting, which is the practice of explicitly denying some identified entities. Whitelisting is one of the backbones of Gold Comet, where you only receive messages from those you have placed in your contacts list. This capability prevents unwanted communications from ever reaching your inbox and rules out more than 90% of all online communications vulnerabilities.



Total Privacy for your Online Communications

Gold Comet was established with the goal of bringing privacy to your online communications. For this reason, we are constantly updating our cyber security posture. Gold Comet started with a Patented encryption system, but we continue to improve and enhance our original idea. So, come visit us at GoldComet.com and contact us with any questions or inquiries you may have!

Back to news

How Gold Comet Works

Gold Comet Messaging is based on a patented process that assigns each encrypted message its own unique key pair. This single use, unique key pair ensures the highest level of security for your messages. All communications and attachments are encrypted at rest and in transit.




bottom of page