Email is a terrific medium for communication, but it's neither private nor secure. For example, did you know that:
Each message you send may pass through many other machines en route to its intended recipient?
Even on the recipient's computer, other users (particularly superusers) can conceivably read your messages as they sit on disk?
Messages traveling over a traditional POP or IMAP connection can be captured and read in transit by third parties?
In this chapter, we provide recipes to secure different segments of the email trail:
Secure your email messages, using encryption and signing
Protect your mail session, using secure IMAP, secure POP, or tunneling
Avoid exposing a public mail server, using fetchmail or SMTP authentication
We assume that you have already created a GnuPG key pair (private and public) on your GnuPG keyring, a prerequisite for many recipes in this chapter. [Recipe 7.6]