Work complete for the version 0.0.0Beta
http://anopticon.ws/13c03c09/OnionMail-0.0.0.B.zip
to create user: telnet 127.0.0.1 9100 C = client S = Server S: +OK ControlPort 1.0 sfl‚4£$£"f C: server alice hackme <- default password S: +OK KESIA [example] `example` C: addusr test <-- local part S: +OK New user created S: Mail=test@your.onion S: User=test S: SMTPPasswd=lunc6){><uFXSpaoWnJHl1px S: POP3Passwd=kfzb};VW,NKwLz"JM2Hmrwot S: Server=your.onion S: MsgSize=2000000 S: MaxMsg=128 S: MsgOld=40 S: Inet= S: QFDN=your.onion S: . C: quit S: +OK Closing
smtp server (tls if available) 127.0.0.1 25 user test etc...etc...
pop3 port 110 (tls if available) 127.0.0.1
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 09/16/2013 09:51 PM, Liste wrote:
Work complete for the version 0.0.0Beta
Any chance you could upload your project to github, or a similar site so that people can review it before downloading? Github also uses SSL, which does offer some amount of protection when downloading random bits of code.
~Griffin
- -- "Cypherpunks write code not flame wars." --Jurre van Bergen #Foucault / PGP: 0xAE792C97 / OTR: saint@jabber.ccc.de
My posts are my own, not my employer's.
Hey,
On 2013-09-17 03:51, Liste wrote:
Work complete for the version 0.0.0Beta
please can you upload the source code as well, because no one is going to execute a .jar file without knowing the program code.
Thanks and greetings Leo
Leo Unglaub ha scritto:
Hey,
On 2013-09-17 03:51, Liste wrote:
Work complete for the version 0.0.0Beta
please can you upload the source code as well, because no one is going to execute a .jar file without knowing the program code.
Thanks and greetings Leo
I'm testing the program, removing unused code etc...., I'm programming the web site of the project... with source code and help...
Why you guys use JAVA for such a security concerned email client?
JAVA itself isn't secure and most relayable computers don't have a virtual machine. You know JavaSnoop and vm-hookers like that?
Just rewrite it into plain C imho...
/jo
Gesendet: Mittwoch, 18. September 2013 um 02:26 Uhr Von: Liste listsmlm@tramacci.org An: tor-dev@lists.torproject.org Betreff: Re: [tor-dev] OnionMail First Test
Leo Unglaub ha scritto:
Hey,
On 2013-09-17 03:51, Liste wrote:
Work complete for the version 0.0.0Beta
please can you upload the source code as well, because no one is going to execute a .jar file without knowing the program code.
Thanks and greetings Leo
I'm testing the program, removing unused code etc...., I'm programming the web site of the project... with source code and help...
tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Josef, Spot on.
On Wed, Sep 18, 2013 at 1:23 AM, josef.winger@email.de wrote:
Why you guys use JAVA for such a security concerned email client?
JAVA itself isn't secure and most relayable computers don't have a virtual machine. You know JavaSnoop and vm-hookers like that?
Just rewrite it into plain C imho...
/jo
Gesendet: Mittwoch, 18. September 2013 um 02:26 Uhr Von: Liste listsmlm@tramacci.org An: tor-dev@lists.torproject.org Betreff: Re: [tor-dev] OnionMail First Test
Leo Unglaub ha scritto:
Hey,
On 2013-09-17 03:51, Liste wrote:
Work complete for the version 0.0.0Beta
please can you upload the source code as well, because no one is going to execute a .jar file without knowing the program code.
Thanks and greetings Leo
I'm testing the program, removing unused code etc...., I'm programming the web site of the project... with source code and help...
tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
josef.winger@email.de ha scritto:
Why you guys use JAVA for such a security concerned email client?
JAVA itself isn't secure and most relayable computers don't have a virtual machine. You know JavaSnoop and vm-hookers like that?
Just rewrite it into plain C imho...
/jo
JavaSnoop and vm-hookers.... Too difficult! Conceptually are like OlyDbg and Ida Pro. You can modify and recompile the software with the source code. You can build a bad version with some negative features. There are a lot of forensic stuff that analyze the contents of RAM do detect data, etc.... These are the same problems of tor java .