Right, really the ONLY secure way to do email is to either
A) build your own secure email server and run it at home on
a physical box.
or B) no email at all...
Protonmail's response concludes with a reminder/suggestion that
using Tor and the Onion links to Protonmail would avoid the
"problem".
So the IP address of your mail server and the registrar's
domain record points directly to your home address? Not
sure if that helps ;-)
And meta data is still leaky through the other participants
mail servers.
Even the link to the onion address is easy to find on their
website. But I think it's mostly a problem of understanding
all the technical details of 'security', anonymity,
surveillance and the network. Protonmail advertises secure
encrypted email and something something privacy (swiss
law). Activist thinks their safe.
I wouldn't use e-mail on the open internet in this context.
Use FTN netmail over Tor! ;-) Or some app made for this use
case like Briar.
ProtonMail Explains Why It Shared a User's IP Address
With Police Even a secure email service can't ignore a
legally binding order from Swiss authorities.
Right, really the ONLY secure way to do email is to either
A) build your own secure email server and run it at home on
a physical box. or B) no email at all...
Right, really the ONLY secure way to do email is to either
A) build your own secure email server and run it at home on
a physical box.
or B) no email at all...
Protonmail's response concludes with a reminder/suggestion that
using Tor and the Onion links to Protonmail would avoid the
"problem".
Protonmail's response concludes with a reminder/suggestion that
using Tor and the Onion links to Protonmail would avoid the
"problem".
So the IP address of your mail server and the registrar's
domain record points directly to your home address? Not
sure if that helps ;-)
And meta data is still leaky through the other participants
mail servers.
Even the link to the onion address is easy to find on their
website. But I think it's mostly a problem of understanding
all the technical details of 'security', anonymity,
surveillance and the network. Protonmail advertises secure
encrypted email and something something privacy (swiss
law). Activist thinks their safe.
I wouldn't use e-mail on the open internet in this context.
Use FTN netmail over Tor! ;-) Or some app made for this use
case like Briar.
Ogg wrote (2021-09-07):
Right, really the ONLY secure way to do email is to either
A) build your own secure email server and run it at home on
a physical box.
So the IP address of your mail server and the registrar's domain record poin directly to your home address? Not sure if that helps ;-)
Also broadband IPs don't work for mail reliably.
And meta data is still leaky through the other participants mail servers.
or B) no email at all...
Protonmail's response concludes with a reminder/suggestion that
using Tor and the Onion links to Protonmail would avoid the
"problem".
Even the link to the onion address is easy to find on their website. But I think it's mostly a problem of understanding all the technical details of 'security', anonymity, surveillance and the network. Protonmail advertises secure encrypted email and something something privacy (swiss law). Activist thinks their safe.
I wouldn't use e-mail on the open internet in this context.
Use FTN netmail over Tor! ;-) Or some app made for this use case like Briar.
Protonmail's response concludes with a reminder/suggestion that
using Tor and the Onion links to Protonmail would avoid the
"problem".
it makes me wonder how many supeanas have already been issued to Protonmail, and the people who run the signal app. i dont trust any of them. its like having a single point of failure. that failure being litigation from corprat controlled gov agencies. I know that proton is used alot for people who a re insiders that are wanting to come forward from the black OPS UFO programs. however i think the proton / signal systems are already compromised. if not by legal means, then by NSA hacking.
Thanks
- Gamecube Buddy
telnet --<{bbs.hive32.com:23333}>--
Use FTN netmail over Tor! ;-) Or some app made for this use
case like Briar.
Never heard of Briar. Sounds very much like Matrix/Element.
But how can such a thing still work with a "broken internet" as
it claims it can?
Re: re: protonmail shares IP address leading to arrest
By: gcubebuddy to Ogg on Wed Sep 08 2021 07:03 am
I don't think there are technical means to read the conversations going
on within a Signal group unless the adecuate decryption keys are in your posession.
While this is likely accurate, if you have a nation state that wants access to your Signal conversations, they just need to compromise one of the participants' phones and install a screen scraper. It's not easy,
but there's always more than one way to skin a horse.
gcubebuddy wrote to Greenlfc <=-
oooh wow ya interesting.... i had no thought about screen captureing
it.
As an aside, last time I did an "upgrade" I was left with a non-bootable system. Whatever it did, the new kernel wouldn't load.. and you'd have to manually load the original kernel.
What distribution do you use?
Sysop: | CyberNix |
---|---|
Location: | London, UK |
Users: | 18 |
Nodes: | 10 (0 / 10) |
Uptime: | 137:08:04 |
Calls: | 819 |
Files: | 3,551 |
Messages: | 558,395 |