Skip to main content
  1. Home
  2. Computing
  3. Web
  4. Legacy Archives

Comcast marches to Google’s beat, will encrypt emails ‘within a matter of weeks’

Add as a preferred source on Google

After a Google Transparency Report revealed which  email services and websites offer encryption, ISP (Internet Service Provider) and cable giant Comcast decided that it will reportedly change its tune in this area, and automatically encrypt its customers’ messages, according to The Wall Street Journal.

The Google report publicly lists popular sites and services, along with a percentage of messages that are encrypted when sending and receiving messages while using them. In essence, the report publicly shames those services that don’t offer encryption, while praising the ones that do. Comcast was one of the worst offenders on the list, with Google’s findings indicating that less than 1 percent of emails received by and sent from Comcast email addresses getting the encryption treatment.

Recommended Videos

However, Comcast is reportedly working hard to amend that practice. Email encryption will be available to Comcast email account holders “within a matter of weeks,” Comcast spokesman Charlie Douglas said. Douglas also noted that the firm is “very aggressive about this.”

“This domain encrypts a very small fraction of emails in transit from Gmail, or none at all,” Google’s report on Comcast’s encryption practices states. It’s important to note that encryption only works when the service you’re using, and the service you’re sending the message to/from, both offer it. Google reportedly began encryption Gmail users’ emails back in 2010.

So why is Comcast taking action on this now? It appears that Google’s move to shine a big light on which companies do and don’t offer encryption was a significant motivating factor. After former NSA analyst Eric Snowden leaked documents which indicate that the U.S. government engages in widespread spying operations on both U.S. citizens and non-U.S. governments, multiple companies have moved to protect their customers’ data from prying eyes. In a move likely centered around protecting its bottom line, Comcast is the newest company to get on that page.

Konrad Krawczyk
Former Computing Editor
Konrad covers desktops, laptops, tablets, sports tech and subjects in between for Digital Trends. Prior to joining DT, he…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more