[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Private mail server (Was: i saw your response on the Tor talk list)
true, but looking at the massive amounts of government's requests from say,
google for inbox content.
i would say that storing your own mail will help a lot.
of course, i don't know the true magnitude of interceptions, and encryption
is a must to hide content.
but it seems to me that practically, to make it harder to intercept
metadata like who is mailing who,
(which, in case of political dissent really is all the government needs to
know.
since that if i talk to a known activist, i should probably be
interrogated.)
a personal mail server can help.
its not perfect, but so far the overhead of such a server doesnt seem too
high to be worth it.
plus, once its working well, i can expand it to say 200 people easily.
if every one of 200 citizens would do that, we would get such decentralized
mail
that it will probably require intercepting a lot more. rather than a single
'national security letter' from an agent.
lets poke big brother in the eye :)
On 18 November 2012 15:07, Julian Yon <julian@xxxxxxxxxx> wrote:
> On Sun, 18 Nov 2012 09:50:20 +0100
> Jérémy Bobbio <lunar@xxxxxxxxxx> wrote:
>
> > With Postfix and probably other mail servers, you can configure a
> > per server TLS policy. You can make sure that the communication with
> > SMTP servers used by your peers is properly encrypted (and not
> > MITM'ed). It makes interception a lot harder.
> >
> > And you can be sure that what you receive in your mailbox will not be
> > harvested for data collection. Unfortunately, you are never alone:
> > this also depends on the server used to send the email...
>
> i.e. you can't actually be sure of anything. Unless you control every
> link from sender to your server, you should assume your message can
> be (or even has been) intercepted. So your peers encrypt their
> traffic to you; doesn't mean that traffic to them was encrypted,
> nor does it mean that plaintext messages can't be plucked straight from
> their queues. While you gain the possibility to control your own
> storage, you don't control anything that any intermediaries (or
> those watching your intermediaries) store. This massively limits your
> advantage, while you have to deal with all the headaches that come with
> running a mail server.
>
> It worries me that this point isn't better understood. It's the same
> faulty reasoning that leads to people wanting 1-hop Tor routes.
> Control of your end and trusting the other end is not enough. Do you
> gain something? Technically yes. Is it enough to phase your
> adversaries? Almost certainly not. Having a fully anonymised mail
> service would be of benefit, but just running your own server doesn't
> even come close to providing adequate security, because SMTP *is
> insecure by design*.
>
>
> Julian
>
> --
> 3072D/F3A66B3A Julian Yon (2012 General Use) <pgp.2012@xxxxxx>
>
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk