The Cone of Silence: Easy email security from Green Eggs & Hammocks.
This is a secret decoder ring for the computer age. You can use it to send private messages to your friends.
Best of all it's free! See the instructions below.

Plain Text: Enter a message here.

Press button to make coded text.

Coded Text: When you receive a coded message, put it here.

Press button to make plain text.

Send To: Enter an email address here.

For example: friend@any.net

Press button to send coded text.

Instructions:

  • The Cone of Silence requires a web browser that supports JavaScript and JavaScript must be enabled.

  • The Cone of Silence may be freely copied and you can do anything you want with it.

  • Save this document to your disk in Source format so you can use it later by opening the file in your browser. This means that you don't have to be online to use it.

  • After pressing Send a standard dialog may pop up warning you that you are sending something. This is normal. Try sending a message to yourself to see what happens.

  • Some browsers won't send the coded text automatically when you press the Send button but will instead open a new email message form. If this happens you should manually cut and paste the coded text into the body of the email message form and send it manually.

  • Send a copy of this file to your friends so they can decode your messages.

  • To decode a message you have received, copy the code text from the message to the Coded Text box and press the Decode button to make plain text above.

  • You can make your own code by making a simple change to this file using a text editor. See the comments in the JavaScript code for instructions.

How secure is The Cone of Silence?

A professional code breaker would have no trouble figuring out the code used here but it's still a valuable protection against the most common threats such as casual snoops and automated scanners.

For example, a credit card thief may be using a tool like a search engine to scan email messages for key words like 'Visa', 'Mastercard', or 'American Express'. The Cone of Silence will foil such an attack.

A message encrypted using a hard-to-break code looks exactly like a message encrypted by an easy-to-break code. Most people will simply not even bother to invest the time needed to attack an encoded message.

How long do you think it would take you to break the code?

MAX: Chief I think we need to use The Cone of Silence.

CHIEF: Not The Cone of Silence Max.

MAX: It's the rules Chief.

CHIEF: Very well Max, The Cone of Silence...

-- from the TV show Get Smart.

email privacy Email private email Privacy security Security confidential Confidential intellectual property encryption decryption encrypt decrypt encode decode email privacy Email private email Privacy security Security confidential Confidential intellectual property encryption decryption encrypt decrypt encode decode email privacy Email private email Privacy security Security confidential Confidential intellectual property encryption decryption encrypt decrypt encode decode email privacy Email private email Privacy security Security confidential Confidential intellectual property encryption decryption encrypt decrypt encode decode email privacy Email private email Privacy security Security confidential Confidential intellectual property encryption decryption encrypt decrypt encode decode email privacy Email private email Privacy security Security confidential Confidential intellectual property encryption decryption encrypt decrypt encode decode