Tor-compatible secure email systems

patgus patgus at stonewwwall.org
Fri Oct 13 01:37:56 UTC 2006


 Or of course, using the keylogger capture the email before it is encrypted.

On Thu, 12 Oct 2006 20:29:39 -0500
patgus <patgus at stonewwwall.org> wrote:

>  Well that should work. PGP offers more of an illusion of security than most people realize. If someone knows whos email they want to read, and can find you online. All they have to do is hack into your computer, steal your keyfile, and install a keylogger to capture your password, and blam - no more encrypted email.
>  Of course this is easier said than done, but still quite possible. To be totally safe you would have to use PGP on a computer that was not connected to a network. You could do this with your method.
> 
> On Thu, 12 Oct 2006 17:45:47 -0700
> "Total Privacy" <nosnoops at fastmail.fm> wrote:
> 
> > 
> > On Wed, 20 Sep 2006 18:43:41 +1000, "glymr" <glymr_darkmoon at ml1.net> said:
> > > yes, port 25 is blocked by most tor exit nodes. however, some webmail
> > > services (notably gmail) use different ports and are usable from tor.
> > 
> > How about this; 
> > 
> > Using PGP or similar to make an encrypted file (txt or word or something). 
> > Then attach it to an ordinary webmail upload function, to send it over to 
> > the recipient that alreday are informed of my public key (and who´s key I 
> > have). All this whitout any need for Thunderbird or anything in computer. 
> > 
> > Anyboby tried this successfully? 
> > 
> > 
> > 
> > -- 
> > http://www.fastmail.fm - The professional email service
> > 
> > 
> > 
> 
> 
> 
> 




More information about the tor-talk mailing list