[tor-talk] Using non U.S. email providers_ allows 'legal' data gathering?

Joe Btfsplk joebtfsplk at gmx.com
Wed Oct 16 15:49:59 UTC 2013


> ========================================================================
> Tor Weekly News                                       October 16th, 2013
> ========================================================================
>
>     [9] https://labs.riseup.net/code/issues/5421
>    
The reference to risup.net in Tor Weekly News isn't in context for this, 
but raises a question.

I've not read a lot on the 'LEAs' gathering data - even email address 
books? (assume getting them from web mail?), but several articles I did 
read indicated one of the ways "LEAs" got around U.S. illegalities of 
spying on citizens that weren't under suspect, is "grab" data from 
servers OUTSIDE the U.S.

DON'T know how large a % of all data gathered is by this method - 
servers outside U.S.
If the articles are accurate, if worried about snooping, is it smarter / 
dumber / makes no difference, to use one of the many "more private / 
secure" providers, often located outside the U.S. (like Riseup.net), or 
just use one in the U.S.?

Of course, the shut down of Lavabit because of demand for access to all 
users' accounts doesn't instill confidence in having a U.S. based acct., 
but there was one user among them on the "(Top) most wanted list."  They 
wanted to make sure no stone was unturned.

1) Articles indicated LEAs could 'legally' capture data when mail is 
sent from U.S. to foreign recipient / server (the LEAs aren't limited by 
laws / constitution in other countries, or don't care).
2) Could capture data if U.S. citizens had email accts in foreign countries.
3) Could capture data originating in the U.S., routed though foreign 
servers, before final delivery to another U.S. server.
4) Could capture data originating from foreign servers, destined for 
U.S. servers.

Or... it may not matter what you do, or where, if not encrypting your email?


More information about the tor-talk mailing list