[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor-compatible secure email systems



 Or of course, using the keylogger capture the email before it is encrypted.

On Thu, 12 Oct 2006 20:29:39 -0500
patgus <patgus@xxxxxxxxxxxxxxx> wrote:

>  Well that should work. PGP offers more of an illusion of security than most people realize. If someone knows whos email they want to read, and can find you online. All they have to do is hack into your computer, steal your keyfile, and install a keylogger to capture your password, and blam - no more encrypted email.
>  Of course this is easier said than done, but still quite possible. To be totally safe you would have to use PGP on a computer that was not connected to a network. You could do this with your method.
> 
> On Thu, 12 Oct 2006 17:45:47 -0700
> "Total Privacy" <nosnoops@xxxxxxxxxxx> wrote:
> 
> > 
> > On Wed, 20 Sep 2006 18:43:41 +1000, "glymr" <glymr_darkmoon@xxxxxxx> said:
> > > yes, port 25 is blocked by most tor exit nodes. however, some webmail
> > > services (notably gmail) use different ports and are usable from tor.
> > 
> > How about this; 
> > 
> > Using PGP or similar to make an encrypted file (txt or word or something). 
> > Then attach it to an ordinary webmail upload function, to send it over to 
> > the recipient that alreday are informed of my public key (and who´s key I 
> > have). All this whitout any need for Thunderbird or anything in computer. 
> > 
> > Anyboby tried this successfully? 
> > 
> > 
> > 
> > -- 
> > http://www.fastmail.fm - The professional email service
> > 
> > 
> > 
> 
> 
> 
>