Results 1 to 13 of 13
Thread: Hushmail alternatives
-
10-21-2007, 10:01 PM #1New Member
- Join Date
- Aug 2007
- Posts
- 21
Hushmail alternatives
Anyone have a recommended alternative to hushmail?
-
10-21-2007, 10:24 PM #2
Lets not put this on the open forum because then Feds can figure out what other secure sites we might be using and tap into them also.
-
10-21-2007, 10:29 PM #3New Member
- Join Date
- Aug 2007
- Posts
- 21
Lol your right , bad thinkin on my part
-
10-22-2007, 04:40 PM #4
-
10-22-2007, 05:19 PM #5
well if someone wants to PM me the popular choice i'd be appreciative
-
10-22-2007, 05:33 PM #6Originally Posted by RuhlFreak55
-
10-22-2007, 08:52 PM #7Junior Member
- Join Date
- Nov 2005
- Posts
- 136
It’s called encrypting your own emails people!!!!!!!!!!!!!
ALL of the “services” out there retain specific data unique to you on their servers that is necessary to encrypt/decrypt your information. If they didn’t do this you would need to exchange keys with everyone you wanted to send an encrypted email to. If you had to do all that why would anyone use their “service”???? All they do is make the encryption process more covenant, but as we have seen with Hushmail this leaves you vulnerable if LE gets involved.
One more time for the people with that deer in the headlights look………
Using a different “service” to encrypt your emails is NOT going to protect you any better than Hushmail can.
-
10-22-2007, 09:30 PM #8
pm me
-
10-22-2007, 09:49 PM #9Originally Posted by TAPPER
-
10-23-2007, 02:48 AM #10
what about if this 'service' were offshore and not subject to us laws
Originally Posted by TAPPER
-
10-23-2007, 10:52 AM #11Junior Member
- Join Date
- Nov 2005
- Posts
- 136
Originally posted by: RuhlFreak55
if both parties need a key how in hell would you communicate with your source???????? he wont have your key for the email..
Granted, it can be a PITA to get people up and running but once in place it’s very simple to use. The upside is that it totally removes the vulnerability of using a third party to perform the encryption/decryption process. It also helps to insulate one customer’s communications from another in the event the email provider cooperates with LE.
For example; if Source X uses a service to encrypt/decrypt emails and it becomes compromised, theoretically LE could read every single communication that the source had stored/sent. All those customers are now vulnerable. On the other hand if the source/customers were to encrypt/decrypt their own emails and the email provider was compromised, all LE would get was encrypt emails. Without the key LE isn’t going to decrypt them so they would have to bust the source before those customers became exposed.
Originally posted by: scaramouche
what about if this 'service' were offshore and not subject to us laws
US v Tyler Stumbo http://static.bakersfield.com/smedia...filiate.25.pdf
details the use of a Mutual Legal Assistance (MLAT) and Other Agreement with Canada to acquire the Hushmail account data. If you go here: http://travel.state.gov/law/info/jud...icial_690.html and scroll down there is a list of numerous countries that have MLAT agreements with the US.
IMO, the only countries that wouldn’t aid the US with access to this type of data would be the axis-of-evil, enemies of the state types. Now, if there was enough money in it for the countries involved maintaining “offshore” servers might fly, such as in the case of the Bahamas and their tax shelters, but access to some email accounts to bust a few people probably happens with only a phone call and then they fill in the legal doc’s if things pan out. (speculation)
-
10-23-2007, 11:12 AM #12Associate Member
- Join Date
- Sep 2007
- Location
- in paradise
- Posts
- 283
as far as email that can be decrypted what about self destructing emails? they are supposed to selfdestruct after the email is viewed.i have several links to a few, although i have never used them it is good to know that i have that option
-
10-23-2007, 04:49 PM #13Junior Member
- Join Date
- Nov 2005
- Posts
- 136
^^ I’m not very familiar with these but from what I have read that you are still relying on a service provider to delete the email from their servers after a predetermined amount of time has expired. This doesn’t prevent them from collaborating with LE and erased data can readily be recovered in many situations.
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Zebol 50 - deca?
12-10-2024, 07:18 PM in ANABOLIC STEROIDS - QUESTIONS & ANSWERS