[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] email over Tor / anonymity sets vs. source IPs (was: Torbutton-birdy version 0.0.2)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

[new thread]



I'm glad you like it.


I see your point.

I exported it as html but it probably contains lots of metadata, which
would take some time for clean up.
I suppose it is less of an effort to open the pdf in a VM appropriate
for untrusted files.
...however if an html version is for some reasons very important for
you I'll reconsider it and add it to my todo list.




I do think that most SMTP servers / MLs include the entire SMTP path
and therefore it is very easy to separate Tor users based on their
source IP anyway. [I agree that it would be nice to have a more common
fingerprint but I do not think it is feasible without sacrificing a
lot on other aspects.] And after all this is only relevant if you
choose to trust your mail provider - which is considered an adversary
in my threat model.
(btw: anyway I finally filed #5997)




I think that such an approach that requires the user to actively select
its language for every message is error prone. As soon as the sender
forgets to select the correct language or fails to choose the correct
language he is screwed.
I prefer something that doesn't depend on user interaction.


thank you for your feedback.




-----BEGIN PGP SIGNATURE-----

iF4EAREKAAYFAk/FU0IACgkQyM26BSNOM7ai+AD9GtMzTqE8apPPk3nkT18MbtTj
vz1TT4yvM5de8CkeIX0BAKtif93dVOa7S9E60E3O+AR0fwmDaurfEZo/jzTTLDUt
=rI6B
-----END PGP SIGNATURE-----
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk