Hush isn't 'bad' and they didn't just roll like yahoo had done. The Feds had warrants as well as a long standing Mutual Legal Assistance Treaty (MLAT) with Canada.
MLAT agreements make it far easier for member countries to make legal maneuvers like summon witnesses, compel document evidence, etc.
The usa has MLAT agreements with 60 or so countries.
http://travel.state.gov/law/info/jud...icial_690.html
Also, basically any company is going to comply with the feds and warrants. Here are the US vs. Stumbo court documents:
http://static.bakersfield.com/smedia...filiate.25.pdf
Apparently Hush, et al's weakness is that they email provider stores all the encryption keys themselves on their servers. That plus a pro government hacker to crack passwords like taking candy ffrom a baby and your done and done.
I"m looking into PGP to encrypt/decrypt my own emails so there is one 'public' key you and the person your sending/receiving an email from both need to have to read the emal PLUS you both need your own private keys. So if you do not hav to personally exchange keys wth every singel person you wish to exchange encrypted communications with your at risk no matter what provider you use.
Apparently it takes two key pairs (four keys) to make the encryption/decription process work. One public key, one private. Then the sender and receiver will have one of each and must exchange public keys beforehand. If any of the 4 keys are missing the encriptions is virtually crack/hack proof.
But if a place like Hush or cyber-rights holds all the keys... well the feds just have to crack the passwords and your done.
PGP:
http://en.wikipedia.org/wiki/Pretty_Good_Privacy
Sorry if this stuff is old news to the bros here. I haven't been here all that long.
Oh yeah, on a different subject, dont' forget to report any rats here:
www.whosarat.com
Copies of supporting docuements help validate the claim someone is a rat.