An off the wall question that's not part of the present discussion, but never the less . . . . .
How well do you read cypher text? How well does any human read cypher text?
Any encrypted information has to be decrypted in order to be read by a human, which is the point, after all.
The proper securing of this sensitive information would be that email is stored on the server in encrypted form, and when called up, it's sent in encrypted format to the display device, which would decrypt it, just in case the communications channel the is being eaves dropped. Further, the encryption mechanism itself would be able to identify if it had been compromised by a '
man in the middle' attack.
Now, secure encrypted systems need to occasionally exchange data with unsecured and unencrypted systems. The sending secure system decrypts the message to send it to the destination that doesn't support encryption. Yes, that's a security hole about as wide as a Mack truck.
Secure systems should only be communicating with other, vetted, known to be secure and trusted systems, for one, and secure systems shouldn't allow data marked as confidential to be sent with unsecured system. The ability to do this would appear to be a flaw in the State's email system.
To be secure, secure systems should be closed systems, only allowing data exchange from other known, proven to be secure and trusted systems. If the need is to exchange email with other insecure systems, then that needs to be a separate unsecured email system for exchanging only non-sensitive information. Essentially separate red and gold networks such as the CIA maintains. 'The twain shall never meet' is the watchword for
real information security. There appears to be no such discipline in this case, at least not that has been revealed to date.
All this encryption is a lot of overhead and trouble for someone's basement email server, so it's not often done, and I doubt that it was done in Hillary's case, but forensic examination of the email server should quickly determine if it had this level of security or not. I rather doubt it. It's a fair amount of work and trouble to set it up, and maintain it, and keep it operating properly.
It is, however, something that a government department, such as State, would have to implemented in their secure email system, and also, something that SoS would have had access to, and use of, had she used the official email system. All the more reason to use that system, rather than a roll your own.
The issue on Hillary's mind isn't information security, although it should have been, it's always been about
control, her control. It would appear that she wanted absolute control over what information State would have, the archivists would have, absolute control over everyone else. Problem is, that's not how it's supposed to work.
Had Hillary ever worked in the private sector, she would have already realized and become accustomed to, the idea that her emails while in the employ of State aren't her emails, they are State's emails, written on behalf of State on State equipment on State's time, and that she has no right in the slightest of asserting any sort of control over those emails.
This is how it works in business. This is how it works in government. Anything written, collected, saved, invented, while employed by a company, on the company's time is the company's and they own it lock, stock and barrel. This is the same as the government which owes Hillary's emails and anything else she may have invented, written, or spoke.
It appears that Hillary just figures that the normal rules that apply to mere mortals simply don't apply to her; the
only possible response to this
has to be 'yes they do, without exception'. It's yet another example, among many others, where she feels that 'normal rules don't apply to her'. So how can she possibly understand, appreciate or identify with 'the common man', who's rules she holds in such contempt? Yeah, that's a campaign and stump speech fail right there. Her actions speak volumes and much louder than her empty words, typically delivered in an unbelievable emotionally lacking manner.
(And yes, I do have experience in the information processing field, and
some experience working under information security disciplines, but I'd not be so bold as to call myself an expert, but only knowledgeable to the extent that I am).