Results 1 to 14 of 14
-
08-25-2013, 09:44 AM #1New Member
- Join Date
- Nov 2012
- Location
- BFE
- Posts
- 44
Secure email all being shut down....
So what all still works out there? With all of the old school popular places already shut down or threatening to based on recent USA stupidity, what is everyone using to communicate now?
-
08-25-2013, 10:12 AM #2
Hushmail.com
-
08-26-2013, 08:45 PM #3
-
08-26-2013, 09:00 PM #4
IP spoofing and bouncing off truly anonymous proxies that don't spill variables is still my preferred method. Can't bust me if you can't trace me.
-
08-26-2013, 09:23 PM #5Originally Posted by Bonaparte
-
08-26-2013, 09:23 PM #6Originally Posted by Java Man
-
08-26-2013, 09:50 PM #7
Don't use a program except to hunt for level 1 proxies. You can find them on the web too but they die fast because everybody else knows about them, too.
Use a variables checker either on your own hosted box or online. I used a js hosted on my own machine. I got it online years ago. I don't do this anymore (no need). I have no reason to hide these days but if I did, the basic tools that work under the os ui layer will never be obsolete. A computer is always a computer at the hardware. No getting around that. Google is your friend spoofing isn't very secure since it still originates at your cable or dsl modem and you can't spoof that or mess with the MAC address. It's highly traceable. Still better than nothing.
-
08-26-2013, 09:52 PM #8
I was going to purchase a VPN program that hides and changes my IP address I believe, it changes ever few mins while online...
Last edited by FONZY007; 08-26-2013 at 10:00 PM.
-
09-03-2013, 05:15 PM #9
Here are my thoughts on this. With the amount of concern there is for real threats to our national security, large scale criminal enterprise, hackers, etc.) and the amount of money being spent to detect suspicious traffic and subsequently crack any methods of cloaking identity or disguising communications, I would be scared to employ most of these tools.
I would like to think that anything I do that is illegal is of minor interest to law enforcement and probably not worth the effort of pursuing, however if I start sneaking around and some one spends 10-100 thousand worth of resources and time only to discover what I am really up to, I feel at that point they would be likely to proceed to prosecution.
Same thing I tell my God-daughter if she is buying a gram of weed from some dumbass who insists on her using some cryptic wording, use another person or she may well wind up as part of an investigation one day. Realistically the local police have a lot better things to do than investigate a hairdresser who sells his coworkers a few gms on Friday but you can bet your ass if they think its kilos of coke and spend a month to develop a CI they will proceed with the process.
Just food for thought on another way of looking at things.
-
09-04-2013, 12:17 AM #10
Gmail because I do not give a fvck what anyone sees.
-
09-08-2013, 02:59 PM #11Junior Member
- Join Date
- Dec 2012
- Posts
- 63
Is there anyone on here that can help I use the app and since I downloaded it I haven't ever had to log in now it says I have to and I can't remember my password is there and way of resetting it
-
02-03-2014, 02:40 PM #12
I prefer to meet in a dark alley behind a bowling alley if possible
-
02-04-2014, 07:14 AM #13There are 3 loves in my life: my wife, my English mastiffs, and my weightlifting....Man, my wife gets really pissed when I get the 3 confused...
A minimum of 100 posts and 45 days membership required for source checks. Source checks are performed at my discretion.
-
02-08-2014, 12:00 AM #14Junior Member
- Join Date
- Oct 2012
- Posts
- 81
Email was never meant to be secure, period. It's transported (regardless of what proxies, etc. you use) not encrypted. You can encrypt it, but I don't think it's worth it and both sides need to support it.
TOR is really one of the only ways, but may raise flags. Good presentation here: Anonymous Internet Communication Done Right [SIGINT10] - YouTube
If it was me, I'd set up a website on a server I control, strongly encrypt some documents and upload/download them. And then use TOR to get them there.
For simple shit, just use a password protected ZIP or PDF or something. No one gives a shit unless you're doing something really illegal.
I could talk about this stuff all day. Did you know that if a major crime is committed any police agency can get from any cell carrier all the cell phone that were connected to the nearest towers? Boom you're a suspect. No warrants needed. They can also get to/from/phone numbers called/received w/o a warrant.
Did you know that email envelope information in emails, texts, FBs, phone calls, and more (as in the To, From, Subject, MTAs, IPs, whether there is an attachment) are all fair game and Google, Microsoft, Apple, all those guys will hand them over to any police agency w/o question. No warrants needed.
Remind me what country we live in?
If you want to learn more watch the DEFCON videos on youtube from last year. It's an annual hacker conference.
Think they're not watching? Google processes (if I recall) over 80,000 requests a year mostly from local police agencies. It's not just the NSA or whatever. They have their own shit.
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Zebol 50 - deca?
12-10-2024, 07:18 PM in ANABOLIC STEROIDS - QUESTIONS & ANSWERS