Simple solutions for message encryption

Cyber lock
Keep those messages from prying eyes

The revelations that the US National Security Agency (NSA) and the UK's Government Communications Headquarters (GCHQ) have been intercepting internet traffic highlight an important fact: many forms of communication are not secure from prying eyes and ears.

The worry is that if the US and UK intelligence communities can snoop on your confidential business communications, then perhaps other governments' intelligence agencies may also do so - not to mention business competitors and criminal gangs.

A partial solution is to encrypt you communications - email, instant messages, mobile phone calls and text messages. Good encryption ensures that no-one who intercepts your communications can read or change the contents. But it's only a partial solution because encrypted messages usually still provide some information, such as who you are communicating with.

Encryption is also a signal that the content is worth hiding - a sure-fire way to attract the attention of eavesdroppers. A foreign intelligence service could store any encrypted communications it intercepts in the hope that in the future new technology will enable their decryption.

PKI encryption

Many encryption systems need two keys: a public one which you make freely available to anyone who wants it, and a private one which you keep secret. A person with your public key can use it to encrypt a message to you - and the message can only be decrypted using your private key.

In the same way, you can encrypt messages to anyone whose public key you have, and it can only be decrypted with their corresponding private key.

This type of solution, known as public key infrastructure (PKI), is extremely secure but far from straightforward to use. It involves acquiring and managing - or at least knowing where to find - the public keys of the people with whom you want to communicate. That's assuming that they even have one.

Mailvelope screenshot

The Mailvelope browser extension

If you're a Microsoft Outlook user you can generate your own keys and encrypt your emails with a plugin called Outlook Privacy Plugin. You can also use the PKI encryption with popular webmail systems including Gmail, Yahoo! Mail and Outlook.com using a browser extension for Firefox or Chrome such as Mailvelope.

Easier use

The good news is that there are plenty of products around offering good encryption which are easy to use and avoid the problem of managing keys altogether.

Many are free and open source while still being up to scratch for business. In fact there's a good argument for saying that you should use open source encryption products whenever possible. That's because it's only possible to verify if a product is as secure as the developers say if the source code is open for inspection.

Encrypted email

Hushmail is a simple webmail service which uses strong encryption to protect messages.

If you are sending an email to someone who has never used Hushmail before then you are asked to add a question to the email (such as "Where did we eat last night?" or "What is the password that we arranged?") that the recipient must answer correctly to decrypt the message. They will then be prompted to supply their own passphrase that can be used to unlock any subsequent emails.

Read our full Hushmail review.

Hushmail screenshot

Hushmail revolves around a passphrase

Encrypted instant messaging

Cryptocat is a free, open source add-on to the Firefox, Chrome and Safari browsers that provides an encrypted instant messaging and file transfer application.

You can use it to chat to colleagues securely in a pre-arranged conversation room from anywhere in the world. Each time you log on and join a conversation the software generates new encryption keys which are exchanged with other users automatically, so there is no possibility of Cryptocat being able to intercept and read your messages.

Read more
Young woman using mobile phone
Best encrypted messaging app for Android of 2025
Concept art representing cybersecurity principles
Best encryption software of 2025
Collage of hand with a key and a smartphone
Is it possible to send a truly anonymous message?
Best secure email provider's logos by TechRadar
Best secure email provider of 2025
Young woman holds a smartphone with a beam of light obscuring her eyes
Privacy powerhouses: 5 apps to take your online security to the next level
A computer file surrounded by red laser beams
Cover your tracks: the risk of sending unencrypted files
Latest in Security
DeepSeek on a mobile phone
More US government departments ban controversial AI model DeepSeek
Trojan
Microsoft warns of a devious new RAT malware which can avoid detection with apparent ease
NordProtect logo
Standalone identity theft protection from Nord Security is now available
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
Ofcom cracks down on UK tech firms, will issue sanctions for illegal content
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
These fake GitHub "security alerts" could actually let hackers hijack your account
3d rendering of a submarine power cable on the seabed
Subsea internet cables can now ‘listen’ for sabotage using irregular pulses of light
Latest in News
Lego Pokemon
Pokemon and Lego announce the most electrifying collaboration of all time and I’m going to be first in line
Apple Watch app health
Apple Watch blood pressure monitoring tech revealed in patent
Using Zipped files and folders in Windows 11
Hidden clues suggest Microsoft is moving another part of Windows 11’s Control Panel to the Settings app – and this time it’s mouse options
an image of the Samsung Galaxy S24 Ultra
Finally! One UI 7 has a release date - here are the Samsung phones that’ll get it first
Google Cloud logo
Google to acquire cloud security platform Wiz in $32 billion deal
GIMP 3.0 interface from the website
Our favorite free photo editor finally got the update it deserves - and these are the top 5 features designers should know about