Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Be Careful, Next Week it Could Be Our Email on WikiLeaks

Hillary Clinton and her staff have been in the news thanks to email hacks, but it could happen to you, too.

October 26, 2016
Email Tips for iOS

Leaked emails are now playing a supporting role in the 2016 election. Forces plotting against Hillary Clinton have released various caches of email belonging to her associates, which include plenty of messages to and from the Democratic nominee.

Opinions She herself established a personal email server during her tenure as Secretary of State, but much of that is beside the point; one insider told me her server was largely hiding in plain sight. Ironically, there is no real evidence it was hacked because no emails from her account, save for those that have been publicly released, have appeared online.

What has been going on is very interesting. Earlier this year, hackers breached the Democratic National Committee and stole emails that were later posted online by WikiLeaks. Also breached was the personal email account of Clinton's campaign chair, John Podesta, the contents of which have been posted to WikiLeaks on an almost daily basis. This is being blamed on the Russians, who appear to be straw men in this hilarity.

Whoever is to blame, people have to realize that email services—Gmail, Yahoo, Outlook—are ripe to be hacked in their entirety. I will not be surprised in the least if one day I wake up and read about how the entirety of Gmail's (or more likely, Yahoo) email archive has been stolen and released to the public, complete with a search engine so you can look up your email and see how much is now in the public domain.

As a result, I'd recommend that you start to be a bit more circumspect about what you write in your emails. Slander and libel lawyers are going to have a field day; income for life.

If you have ever worked with lawyers during a case, they will emphasize not to ask questions or say anything about the case using email. You either tell them in person or on the phone. In person is best and keep no records. This is because of a process called discovery. With discovery, one of the sides in any legal action will request documents and the various sides have to provide them. Often this request includes all emails from one date to another or about a specific topic. The result is boxes full of documents or gigabytes of emails. Inside those emails is horrid information that's not really related to the case but gets into the record anyway.

As a personal note, years ago a case against Microsoft revealed that the company named me as someone who should not be given any details on a specific future release of Windows. I was on the enemies list for doing my job, which I considered a badge of honor. But how did I find this out? Discovery. It just happened to be mixed in with other emails.

Recommended by Our Editors

Nobody outside the legal profession takes this threat seriously. Thus, within your notes to fellow workers or associates you might unknowingly smear people, discuss secrets, and send around documents that should not even be digitized let alone passed around like a brown-bagged bottle of whiskey at a hobo encampment.

Awareness helps. Ask yourself, would post this private message on Facebook for everyone to see? If not, re-write it and talk on the phone more. Maybe it's best to do everything in person, like the good old days. That way you'll get some fresh air and maybe some lunch. It's all for the best.

Get Our Best Stories!

Sign up for What's New Now to get our top stories delivered to your inbox every morning.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About John C. Dvorak

Columnist, PCMag.com

John C. Dvorak is a columnist for PCMag.com and the co-host of the twice weekly podcast, the No Agenda Show. His work is licensed around the world. Previously a columnist for Forbes, PC/Computing, Computer Shopper, MacUser, Barrons, the DEC Professional as well as other newspapers and magazines. Former editor and consulting editor for InfoWorld, he also appeared in the New York Times, LA Times, Philadelphia Enquirer, SF Examiner, and the Vancouver Sun. He was on the start-up team for C/Net as well as ZDTV. At ZDTV (and TechTV) he hosted Silicon Spin for four years doing 1000 live and live-to-tape TV shows. His Internet show Cranky Geeks was considered a classic. John was on public radio for 8 years and has written over 5000 articles and columns as well as authoring or co-authoring 14 books. He's the 2004 Award winner of the American Business Editors Association's national gold award for best online column of 2003. That was followed up by an unprecedented second national gold award from the ABEA in 2005, again for the best online column (for 2004). He also won the Silver National Award for best magazine column in 2006 as well as other awards. Follow him on Twitter @therealdvorak.

Read John C.'s full bio

Read the latest from John C. Dvorak