[liberationtech] mail2tor.com hidden service
zaki at manian.org
zaki at manian.org
Thu Jan 1 16:06:39 PST 2015
Plaintext over Tor to email accounts are probably not safe.
We've seen a major round of this where the Feds seize a hosted anonymous
email account and then email plain texts appear in indictments. Perhaps the
most famous is the TorMail & Charlie Shrem case.
http://www.forbes.com/sites/runasandvik/2014/01/31/the-email-service-the-dark-web-is-actually-using/
On Thu, Jan 1, 2015 at 12:01 AM, Richard Brooks <rrb at g.clemson.edu> wrote:
> Does anyone have any info about this hidden service?
>
> I've been using it to set up temporary accounts to
> exchange info as a pgp work-around for people having
> trouble working with pgp keys. I assume the content
> can be read by whoever runs the site, but they won't
> know who I am.
>
> If the other side uses the hidden service, too. The mails
> can be read but the service won't know who either side is.
>
> Any faults in this logic?
>
> --
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator at
> companys at stanford.edu.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20150102/8d08cb9b/attachment.html>
More information about the liberationtech
mailing list