Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] mail2tor.com hidden service

zaki at manian.org zaki at manian.org
Thu Jan 1 16:06:39 PST 2015


Plaintext over Tor to email accounts are probably not safe.

We've seen a major round of this where the Feds seize a hosted anonymous
email account and then email plain texts appear in indictments. Perhaps the
most famous is the TorMail & Charlie Shrem case.

http://www.forbes.com/sites/runasandvik/2014/01/31/the-email-service-the-dark-web-is-actually-using/


On Thu, Jan 1, 2015 at 12:01 AM, Richard Brooks <rrb at g.clemson.edu> wrote:

> Does anyone have any info about this hidden service?
>
> I've been using it to set up temporary accounts to
> exchange info as a pgp work-around for people having
> trouble working with pgp keys. I assume the content
> can be read by whoever runs the site, but they won't
> know who I am.
>
> If the other side uses the hidden service, too. The mails
> can be read but the service won't know who either side is.
>
> Any faults in this logic?
>
> --
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator at
> companys at stanford.edu.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20150102/8d08cb9b/attachment.html>


More information about the liberationtech mailing list