- Joined
- Jun 15, 2006
- Messages
- 11
I'm not sure what forum to place this in, but this gets the most attention, so this is where I posted it. I figured that I would list the current options for secure email. I want to know all your questions and concerns. I will do my best to help find the right solution and then write up tutorials.
Rank---Name --- Country, Operating System / Software
1__S-mail.com - Russian Federation!!, RHEL (Red hat Linux), Apache
2__Anonymousspeech.com - JAPAN!!!, Microsoft IIS6.0
3__Safe-mail.net - Isreal, CentOS (Linux), Apache
4__Cryptomail.org - USA, Unix, Apache
5__Securenym.net - USA, Unix, Apache
6__Hushmail.com - UK, Apache
7__Cyber-rights.net - Canada, Microsoft
(I would say Cyber-rights and Hushmail are only good for sending semi-sensitive material where you need IP address anonymity, but it can be found with a court order. It can't be seen be the receiver.)
Ideally we would figure out how to get PGP or GPG working and use that in conjunction with the above. If anyone knows anything about this, PLEASE get in touch with me and give me a starting point. I'd be glad to work up a tutorial for bro's!
Also, I do not believe that Skype can be surveilled at this moment. It uses a P2P encryption that isn't standard on VoIP.
Now to the proxies. There are programs like the "Anonymizer". You can also look into Tor, which was created by the Navy so I suspect there are back doors built in. Now there are free anonymous proxies but the good ones are few and far between. I would recommend a paid service or setting up one yourself with a free SSH shell account and tunneling to it (this is really cool as you can make your own proxy and jump 1-1000+ times, just depending upon the # of free accounts you can find.) I will write much more on this, but PLEASE put your questions here so I will be able to see what I am de****g with . I'll also cover using unsecured wireless and possibly secured wireless
Computer security. Well this area is pretty broad. We are talking about windows or Linux. Firewall's. This is the last section that I feel like deal-ing with, but I will cover it in more detail later. I figure I may make different levels of security measures so depending on if you are a client or a source, you can protect yourself adequately.
PLEASE let me know any questions that have gone through your head while reading this (that relate to the topic). If you have computer know-how and want to help out, by all means, I'm open to someone else re-searching. I have a lot on my table and would like to share some of the research.
Thanks
Rank---Name --- Country, Operating System / Software
1__S-mail.com - Russian Federation!!, RHEL (Red hat Linux), Apache
2__Anonymousspeech.com - JAPAN!!!, Microsoft IIS6.0
3__Safe-mail.net - Isreal, CentOS (Linux), Apache
4__Cryptomail.org - USA, Unix, Apache
5__Securenym.net - USA, Unix, Apache
6__Hushmail.com - UK, Apache
7__Cyber-rights.net - Canada, Microsoft
(I would say Cyber-rights and Hushmail are only good for sending semi-sensitive material where you need IP address anonymity, but it can be found with a court order. It can't be seen be the receiver.)
Ideally we would figure out how to get PGP or GPG working and use that in conjunction with the above. If anyone knows anything about this, PLEASE get in touch with me and give me a starting point. I'd be glad to work up a tutorial for bro's!
Also, I do not believe that Skype can be surveilled at this moment. It uses a P2P encryption that isn't standard on VoIP.
Now to the proxies. There are programs like the "Anonymizer". You can also look into Tor, which was created by the Navy so I suspect there are back doors built in. Now there are free anonymous proxies but the good ones are few and far between. I would recommend a paid service or setting up one yourself with a free SSH shell account and tunneling to it (this is really cool as you can make your own proxy and jump 1-1000+ times, just depending upon the # of free accounts you can find.) I will write much more on this, but PLEASE put your questions here so I will be able to see what I am de****g with . I'll also cover using unsecured wireless and possibly secured wireless
Computer security. Well this area is pretty broad. We are talking about windows or Linux. Firewall's. This is the last section that I feel like deal-ing with, but I will cover it in more detail later. I figure I may make different levels of security measures so depending on if you are a client or a source, you can protect yourself adequately.
PLEASE let me know any questions that have gone through your head while reading this (that relate to the topic). If you have computer know-how and want to help out, by all means, I'm open to someone else re-searching. I have a lot on my table and would like to share some of the research.
Thanks