Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply US-PHARMACIES
UGL OZ Raptor Labs UGFREAK
napsgeargenezapharmateuticals domestic-supplyUS-PHARMACIES UGL OZUGFREAKRaptor Labs

FEDS have access to HUSHMAIL READ

This is why I'm seriously thinking about staying in Canada after I finish schooling there. I can't stand this shit anymore............I never dealt personally with OSOCA, but I know a guy who said he had "personal", ie not just internet, dealings with the guy and was as standup as it gets. Take it for what you will............but this is getting ridiculous. It's fuckin bullshit though that Canada forced one of it's private companies to cough up their customer list.
 
ef runs its e-mail through hush. There is nothing stoping LE from obtaining email sent through hush or you ef account. sorry bros.
 
I am so fucking sick of this bullshit!!! I will not live in fear!!! If you fuckers are reading this you can lick my steroid taking ass!!! I will not live in fear!!! This is MY body not yours and I WILL do with it as I want to!!! I will not live in fear!!! Read my email, listen to my cellphone calls, take pictures of me running red lights and I STILL WILL NOT LIVE IN FEAR!!!

FUCK YOU AND HAVE A NICE DAY!!!

BigGuyPHX
 
I skimmed the link.
Am I right in concluding that only the hushmail address that was under suspicion was released to the DEA?
If that's true than any one of us could have our hushmail investigated, but it's highly unlikely unless the individual is already under investigation for something illegal.
 
Did you guys know that if I go onto Google earth I can see an aerial photo of your home!
 
mr. snakes said:
For now it would be best for EVERYONE to switch to mailvault.com

do you have a link to their privacy policy and TOS? I couldnt find them.

also, I get a warning page "Problem with this sites Security certificate" when I access lol
 
BigGuyPHX said:
I am so fucking sick of this bullshit!!! I will not live in fear!!! If you fuckers are reading this you can lick my steroid taking ass!!! I will not live in fear!!! This is MY body not yours and I WILL do with it as I want to!!! I will not live in fear!!! Read my email, listen to my cellphone calls, take pictures of me running red lights and I STILL WILL NOT LIVE IN FEAR!!!

FUCK YOU AND HAVE A NICE DAY!!!

BigGuyPHX


...you're my hero... :qt:
u will not live in fear until....... :theshadow comes 4 u.... :worried: :p :)
 
No offense to anyone that did ...but I can't believe anyone thought there were free "secure" ways for you to send email to drug dealers. The federal government breaks secure transmissions from terrorists and other nations security services and I'm supposed to think I'm one click away from confounding the govt? I've poked around on here for a couple months and am baffled at all the loose ends people leave.

If LE had more time on their hands it would really be like shooting fish in a barrel.....and once some of the info from DEA trickles down to the local and state level maybe it will be.
 
Last edited:
Just throwing it out there, but GLP was busted. Who's to say that he didn't cooperate and give his password (and therefore key) to the DEA who used that and MLAT to read all emails that were sent to/from his account? In that manner, the DEA could subpoena the encrypted email transactions and used the keys they got from GLP's email addy to decrypt them. So they may not have the ability to get every hushmail they want decrypted, only the emails to which they got a password to get into. Honestly not a computer guru, but anyone who is could let me know if the above holds water.
 
Plantro said:
Just throwing it out there, but GLP was busted. Who's to say that he didn't cooperate and give his password (and therefore key) to the DEA who used that and MLAT to read all emails that were sent to/from his account? In that manner, the DEA could subpoena the encrypted email transactions and used the keys they got from GLP's email addy to decrypt them. So they may not have the ability to get every hushmail they want decrypted, only the emails to which they got a password to get into. Honestly not a computer guru, but anyone who is could let me know if the above holds water.
Wrong,if they have an email addy they suspect is doing something wrong, they can get the password.
 
Thanks for the link. Truthfully, I'm not that concerned. The accused had his e-mails turned over to the Feds because he had already executed an illegal transaction with an undercover agent. It was his on-line advertisement, not his use of Hushmail, that brought him to the attention of the DEA.

So, until they start using random searches of Hushmail e-mail accounts to build cases against users, I'm not going to panic. If they do, I will be happy to join the class action suit that will undoubtedly be formed and sue the living hell out of the government for 1.)violating my constitutionally implied right to privacy, 2.) illegal electronic search and seizure, and/or 3.) wiretapping without a warrant. This would be a clear violation of the law, even under the Patriot Act. So, those jive motherfuckers can bring it on because I know legions of lawyers, all of whom would love to take on a case like that for free.

Now watch as Jerseyrugger extends his middle finger in the general direction of Washington, DC. :finger:
 
u honestly think that in a country which has seem to become really fucked up under bush, that u honestly think u can beat them or sue the government....? oh yeah no lawyers work for free. nobody does or ever will. if they think u are up to something and prove it....ur fucked. it's that simple. warrent or not. steroids unfortunately are illegal, and at the time are public enemy #1. sad but true.
 
I think as long as you are not distributing, especially in mass quantities, they are not going to hunt down every person they think are using because of email. Take time to surveillance you, just to get you on a possesion of controlled substance, that is if you even have anything on you or atleast that they can find. I dont think the user will have much consequence. What does anyone else think about it?
 
aaron_everette said:
I think as long as you are not distributing, especially in mass quantities, they are not going to hunt down every person they think are using because of email. Take time to surveillance you, just to get you on a possesion of controlled substance, that is if you even have anything on you or atleast that they can find. I dont think the user will have much consequence. What does anyone else think about it?
agreed
 
you are dreaming if you think any class action is going to brought against the government............the supreme court is now VERY conservative and will rule in favor of federal powers. Those of us who feel our bodies are our own personal belonging are fucked. This is why I will have no compunction leaving this place...........nobody owns me.


jerseyrugger76 said:
Thanks for the link. Truthfully, I'm not that concerned. The accused had his e-mails turned over to the Feds because he had already executed an illegal transaction with an undercover agent. It was his on-line advertisement, not his use of Hushmail, that brought him to the attention of the DEA.

So, until they start using random searches of Hushmail e-mail accounts to build cases against users, I'm not going to panic. If they do, I will be happy to join the class action suit that will undoubtedly be formed and sue the living hell out of the government for 1.)violating my constitutionally implied right to privacy, 2.) illegal electronic search and seizure, and/or 3.) wiretapping without a warrant. This would be a clear violation of the law, even under the Patriot Act. So, those jive motherfuckers can bring it on because I know legions of lawyers, all of whom would love to take on a case like that for free.

Now watch as Jerseyrugger extends his middle finger in the general direction of Washington, DC. :finger:
 
Plantro said:
Just throwing it out there, but GLP was busted. Who's to say that he didn't cooperate and give his password (and therefore key) to the DEA who used that and MLAT to read all emails that were sent to/from his account? In that manner, the DEA could subpoena the encrypted email transactions and used the keys they got from GLP's email addy to decrypt them. So they may not have the ability to get every hushmail they want decrypted, only the emails to which they got a password to get into. Honestly not a computer guru, but anyone who is could let me know if the above holds water.

I think you nailed it.
 
digger said:
I think you nailed it.

that might explain GLP, but not OSOCA (the link in the first post)- his indictment indicates the emails were obtained and read while he was still under investigation, before he was arrested.

The only thing that would explain OSOCA is a compromise of hushmails implementaion of PGP, a keystroke recorder on OSOCAs machine that captured his passphrase, or that he was sending cleartext emails from hush to non-hush recipients.

the official open-source verifiable version of PGP doesnt have to be compromised or have a backdoor, only Hushmails implementation of it. As far as I've read, it doesnt look like Hush has any 3rd party independent audit/confirmation of the version of PGP they use and how they implemented it (mods, tools etc).
 
Mavafanculo said:
that might explain GLP, but not OSOCA (the link in the first post)- his indictment indicates the emails were obtained and read while he was still under investigation, before he was arrested.

The only thing that would explain OSOCA is a compromise of hushmails implementaion of PGP, a keystroke recorder on OSOCAs machine that captured his passphrase, or that he was sending cleartext emails from hush to non-hush recipients.

the official open-source verifiable version of PGP doesnt have to be compromised or have a backdoor, only Hushmails implementation of it. As far as I've read, it doesnt look like Hush has any 3rd party independent audit/confirmation of the version of PGP they use and how they implemented it (mods, tools etc).


They could have read the emails after the arrest, after the possibility of OSOCA giving up the keys existed.

Obtaining emails from hush prior still provides momentum to the investigation since you know whom he is speaking with - in this case at least one well known raw materials supplier.

Either that or the keylogger route - as used the MDMA case.

Ownded.
 
I'm using my new email.... smoke signals like the indians.... and they are encrypted sukas!!!!! how's that LE?! heheheh lol
 
if they do have access.. no matter what they have backup tapes that would also be able to be searched for evidential actions
 
muffinmaker said:
Wrong,if they have an email addy they suspect is doing something wrong, they can get the password.


right. for feds is just a phone call to hush. "we need that password now or tomorrow yall be harvesting rice in a chinese field"

similar to what happened to Pakistan after 9/11. Our government called Pervert Musharaff the next day and basically told him "you will be our allied or we will bomb your ass to stone age"
 
it seems like the actual hushmail company handled the cds with all the confirmed emails sent and orders taken. man this fukig sukcs ass!!! i hate this
 
DJ_UFO said:
right. for feds is just a phone call to hush. "we need that password now or tomorrow yall be harvesting rice in a chinese field"

similar to what happened to Pakistan after 9/11. Our government called Pervert Musharaff the next day and basically told him "you will be our allied or we will bomb your ass to stone age"


You're spreading nonsense.

Hushmail never gets your passphrase. They don't have it to hand out.

This is evident by:

1) Industry review by security experts would have outted this complete lapse of security.
2) The DEA has used keyloggers on suspects computers to get passphrases for hushmail.
 
jh1 said:
They could have read the emails after the arrest, after the possibility of OSOCA giving up the keys existed.

Obtaining emails from hush prior still provides momentum to the investigation since you know whom he is speaking with - in this case at least one well known raw materials supplier.

Either that or the keylogger route - as used the MDMA case.

Ownded.


I dunno, I am still thinking hush is not what they say they are. Just for the reason I feel they would have had to mention that they used a key stroke recorder in the inditement.
 
so if they don't have it how they handled the cds with all the orders, customers, transactions to LE?? according the legal document pdf on the previous page.

jh1 said:
You're spreading nonsense.


Hushmail never gets your passphrase. They don't have it to hand out.
 
rdel85 said:
I dunno, I am still thinking hush is not what they say they are. Just for the reason I feel they would have had to mention that they used a key stroke recorder in the inditement.


Security experts would have called hush out on that.

They don't mention a keystroke logger, the owner of the account turning over the password, hush providing clear text email message bodies, or some government encrtyption intelligence cracking the code...

Something had to have occured to get clear text. They simply didn't disclose whatever mechanism in the indictment, hush is not the most likely source....

I think it's a distinct possibility the indictment was written that way to shake everyone's confidence in hush. If that was their goal, they have certainly suceeded.
 
jeb0177 said:
so if they don't have it how they handled the cds with all the orders, customers, transactions to LE?? according the legal document pdf on the previous page.

They handed over CDs containing all the emails. The email bodies were encrypted.

Customers are exposed through headers which are clear text. Specfics of orders such as what was ordered and amounts, shiping addys and stuff would have to be decrypted.

Either through knowledge of the keys from a keylogger or from the target of the indictment post arrest.
 
jh1 said:
They handed over CDs containing all the emails. The email bodies were encrypted.

Customers are exposed through headers which are clear text. Specfics of orders such as what was ordered and amounts, shiping addys and stuff would have to be decrypted.

Either through knowledge of the keys from a keylogger or from the target of the indictment post arrest.

Or a brute force attack on the passphrase if it wasn't a particularly good one. But yeah, that's a really good summary.

People, The Man is not going to burn his sources willingly, any more than y'all would burn yours. Spreading fear and uncertainty about Hush? Sure, they'll do that. It works in their favor, big time. They also want you to keep thinking of Hush as black magic, and not as a system where you have to think about all the parts.

If you're corresponding with someone who thinks 'yomama' is a good PGP passphrase, you and he are both screwed.

If either of you is bigtime enough for Papa Fed to authorize a breakin and a keylogger on your keyboard(s), you're also screwed... unless you're Jack f'in' Bauer, and check for the blonde hair you carefully stretched under the keyboard, every single time it's used.

Back in WWII, Churchill and Roosevelt had a scrambled telephone. The Nazis had a descrambler, but it didn't do them any good, because Winston and FDR would only talk about documents that had been sent by courier, so all the eavesdroppers got were two guys saying stuff like "About item 17, I say yes."

The British operator had a standing order to tell everyone not to discuss classified material on the scrambler phone before she made the connection, and every time she read the order to Churchill, he said "Yes, ma'am."

Imagine the operator giving Hitler the same reminder.

"HEY, I'm Adolf Fuckin' Hitler, bitch! Put Rommel on and snap it up!"

Churchill lived to write history books about winning the war. Hitler ate a cyanide pill with a 9mm chaser.

We have smart people here telling you "here's where it's broken, and here's where it isn't broken." Listen to them.
 
jh1 said:
They could have read the emails after the arrest, after the possibility of OSOCA giving up the keys existed.
...........
...........

Either that or the keylogger route - as used the MDMA case.

I) Definitely read prior to arrest.

From the indictment (post 1) they read the emails prior to June 8 - they got the PO box # from the emails and served a subpeona on that date to get the subscriber info for that PO box.

OSOCA was still in business and the DEA placed an order with him on July 25.

So they definitely had access to decrypted emails prior to his arrest and possibility of cooperation.

That leaves in decreasing order of probability:

-1) keystroke logger

-2) diggers brute force attack on a weak passphrase (hadnt thought of that :D )

-3) compromise of Hushmails implementation of PGP.

if anyone knows of Hushmail having an independent auditors letter or Crypto community having oversite access to THEIR SOURCE and THEIR IMPLEMENTATION of PGP post up a link.

Lacking the above, nothing would stop Hushmail from installing a backdoor (perhaps at the "request" of USA or Canada post-9/11), and no one would ever know.

-

-4) The possibility of cleartext email between OSOCA and GLP is out because GLP was on Hushmail as well.


II) Is this sentence in the indictment a hint? -> ".....Hushmail is a free encrypted email service that CLAIMS to secure the privacy security and authenticity of emails sent and received by its users....."

-
 
Last edited:
Mavafanculo said:
I) Definitely read prior to arrest.

From the indictment (post 1) they read the emails prior to June 8 - they got the PO box # from the emails and served a subpeona on that date to get the subscriber info for that PO box.

OSOCA was still in business and the DEA placed an order with him on July 25.

So they definitely had access to decrypted emails prior to his arrest and possibility of cooperation.

That leaves in decreasing order of probability:

-1) keystroke logger

-2) diggers brute force attack on a weak passphrase (hadnt thought of that :D )

-3) compromise of Hushmails implementation of PGP.

if anyone knows of Hushmail having an independent auditors letter or Crypto community having oversite access to THEIR SOURCE and THEIR IMPLEMENTATION of PGP post up a link.

Lacking the above, nothing would stop Hushmail from installing a backdoor (perhaps at the "request" of USA or Canada post-9/11), and no one would ever know.

-

-4) The possibility of cleartext email between OSOCA and GLP is out because GLP was on Hushmail as well.


II) Is this sentence in the indictment a hint? -> ".....Hushmail is a free encrypted email service that CLAIMS to secure the privacy security and authenticity of emails sent and received by its users....."

-



I am still leaning towards a keylogger.

Brute force is a possibility, but at that level - I doubt the DEA attempts decryption via brute force. Even a trivial password would take a significant amount of time - and there is no guarantee. You may run that for weeks on end and end up no where. I would think they farm all 'cracks' out to a much more focused group like the NSA, and I sincerly doubt they get involved for such trival nonsense.

As far as a backdoor - if there was and hush was complying and conspiring - then why would the DEA seek a warrant for a break / enter and suripticiously install a keylogger in the much more important MDMA manufacturing case linked earlier? Seems ass backwards if they could simply make a phone call to hush and get the clear text - no?

The only hint that could point otherwise was that in the MDMA case they insisted upon the keylogger because they needed 'realtime' access to clear text emails - which in a hush/backdoor scenario - hush may not be setup to provide real time - they may have to retreive the emails, decrypt, send on a CD to LE.


How you would approach countering *ALL* these possibilities would vary depending upon if you were a customer or a distributer.
 
^^^

The indicment definetly implies they read the emails between osoca and glp, and were able to subpoena the PO Box that was revealed in those emails as a result. All of which happened prior to any arrest.



BTW - You gotta have a chuckle at the Abercrombie & Fitch employment considering all the C&C fools that make fun of anyone that wears A&F.
 
I haven't read as thoroughly, however I do know that to serve a warrant on a po box, an affadavit must be made indicating there is probable cause. To illegally break into an email, illegally take emails and see a random po box number and to ASSUME that money/drugs are being shipped there...simply would not be allowed into the affadavit because the email itself would need an affadavit to be hacked into to be then used as cause for issuance on the PO box.

More likely, these emails "read prior to subpoena" of the po box, were emails between a CI (FED) posing to be a client. Once 1-2 transactions are complete, THEN they have the info necessary to get at the po box...and summarily busting down his door and scaring him to death saying things such as "We know EVERYTHING about you. Give us your passphrase and cooperate and we will leave you alone, maybe you could even help us. Guys that aren't helpful face about 10 years in prison, guys who are helpful maybe just get probation. We know you spoke with GLP, let us have that passphrase and we will be on our way and contact you from time to time if we need some info."

Once that happens, they can now subpoena all old emails exchanged between osaca and other parties, and they also have the keys to decrypt them.

The real fault of hushmail seems to be holding on to transpired email conversations. If they didn't do that, there'd be no emails to dig up besides what he is dumb enough to leave in his inbox.
 
jh1 said:
I beleive they may have gotten the PO Box # you refer to from communications with OSOCA where they were posing as a customer - no?

no this was a po box where he received HIS stuff from the overseas supplier (GLP). OSOCA's buyers just emailed WU info or greendot info, they never got a box number - .

If that's not the case, here's where I am at:

I am still leaning towards a keylogger.

Yup.

Brute force is a possibility, but at that level - I doubt the DEA attempts decryption via brute force. Even a trivial password would take a significant amount of time - and there is no guarantee. You may run that for weeks on end and end up no where. I would think they farm all 'cracks' out to a much more focused group like the NSA, and I sincerly doubt they get involved for such trival nonsense.

As far as a backdoor - if there was and hush was complying and conspiring - then why would the DEA seek a warrant for a break / enter and suripticiously install a keylogger in the much more important MDMA manufacturing case linked earlier? Seems ass backwards if they could simply make a phone call to hush and get the clear text - no?

The only hint that could point otherwise was that in the MDMA case they insisted upon the keylogger because they needed 'realtime' access to clear text emails - which in a hush/backdoor scenario - hush may not be setup to provide real time - they may have to retreive the emails, decrypt, send on a CD to LE.

That was my thought - getting a subpeona, serving, hush preparing and sending takes time - a key logger can transmit in real time or short-delay bursts.


How you would approach countering *ALL* these possibilities would vary depending upon if you were a customer or a distributer.


at some point, the propeller heads in the crypto community will latch on to this (or someone should make them aware) and eventually it will force a response from Hush

...
 
jh1 said:
^^^

The indicment definetly implies they read the emails between osoca and glp, and were able to subpoena the PO Box that was revealed in those emails as a result. All of which happened prior to any arrest.
...

alrite, now lets go back to C&C and make fart jokes.
 
Mavafanculo said:
at some point, the propeller heads in the crypto community will latch on to this (or someone should make them aware) and eventually it will force a response from Hush

...



It's going to take industry pressure on Hush to reaffirm their system, and open portions to peer review. I've made some posts in the right places with links to the indictment, not to many peeps are biting at the moment... but there is some interest...

We'll see....

If you can get the story to page 1 on DIGG you'd be golden, with that much pseudo mainstream attention the security researchers would have to respond...
 
jh1 said:
It's going to take industry pressure on Hush to reaffirm their system, and open portions to peer review. I've made some posts in the right places with links to the indictment, not to many peeps are biting at the moment... but there is some interest...

We'll see....

If you can get the story to page 1 on DIGG you'd be golden, with that much pseudo mainstream attention the security researchers would have to respond...


niceeeeeeeeeeeeee lol
 
Mavafanculo said:
niceeeeeeeeeeeeee lol



I think getting Phil Zimmermann's attention would be key. He'd be greatly offended considering how much he put into PGP. If someone can device a plan to shake him up a bit, you'd be in.

Contacting him is easy. Too easy. He gets way too much email for something from me to get his attention.

Or someone he considers his peer... Bruce Schneier, etc.
 
Thanks Digger, Mavafanculo, and jh1 for some excellent reading and aiding in lowering my bloodpressure.
Also is cyber-rights and Hush the same company?
 
I just talked to a crypto friend that is on a mailing list that Phil participates on regularly. He's going to post something.

Harder to ignore if others are interested and keep asking for Phil's input.
 
Megalomaniac said:
Did you guys know that if I go onto Google earth I can see an aerial photo of your home!

Not mine. I am under a cloak of invisibility. Also, I can see you through my computer screen. Put some pants on.
 
If anything convinces everyone that Hushmail is on the up and up it should be this:


https://www.hushmail.com/services-downloads?


All of their source code available for download. You can compile that yourself and never use any precompiled code from them. Open Source programs - especially when it comes to security software - is torn apart by security researchers looking for holes and vulnerabilities.
 
jh1 said:
If anything convinces everyone that Hushmail is on the up and up it should be this:


https://www.hushmail.com/services-downloads?


All of their source code available for download. You can compile that yourself and never use any precompiled code from them. Open Source programs - especially when it comes to security software - is torn apart by security researchers looking for holes and vulnerabilities.

This is getting towards the "crypto community oversight access to Hushs source and implementation of PGP" --

BUT..... to play skeptic and Devils advocate: - >

1) is the source included for the "DLL wrapper on the java applet" - if not, this binary would be a safe haven possibility for a backdoor or a sidedoor

2) same as #1 for the downloadable " Java libraries for communicating with the Hush Key Servers " source included?

3) if ALL source is included, then reviewed, and deemed clean by peer review or Audit Letter, and then the resulting executables compiled from that source code are compared and identical to the executables deployed in the applets downloaded each time you access Hush, then its all good (and the keylogger was the likely failure point)

-> as far as users compiling all the components from all the source and using that instead of what Hush downloads to you, even if technically do'able (not sure) because of all the languages involved and the tech expertice neccessary, this would be practical for about 0.00000001% of the Hushmail users.

I suppose a safe setup would be having a trusted independent crypto organization do the review and compile and then you'd download the executable from their site. sort of an escrow for the trustworthy executables.


But all in all, Occam would say this likely leaves Keylogger as the likely failure point IF the conditions above are met


It all boils down to independent review and then being sure you are using what was independently reviewed.
 
slat1 said:
If anyone thought there was such a thing as "secure email" they are a bit naive!


Sorry Bro... you're gonna have to qualify that statement. That's way broad of a statement.

Email can be secure, you have to handle it properly.
 
jh1 said:
Sorry Bro... you're gonna have to qualify that statement. That's way broad of a statement.

Email can be secure, you have to handle it properly.

It may be safe from Joe Schmoe but the Feds can crack that shit in a second if they want to do it.
In other words. If you raise a Red Flag they will access secure email just as quickly as regular.
I also mentioned in another thread being at the AVN Awards and walking past the Consumer Electronics Convention.
At the entrance there was a huge screen that was showing everyones email log in and password. The password would have a star or two covering random letters.
The point was if you logged in at any hotel they cracked that shit in seconds and had it up on a scrolling screen.
There were more then a few "secure" addresses up there!
 
slat1 said:
It may be safe from Joe Schmoe but the Feds can crack that shit in a second if they want to do it.
In other words. If you raise a Red Flag they will access secure email just as quickly as regular.
I also mentioned in another thread being at the AVN Awards and walking past the Consumer Electronics Convention.
At the entrance there was a huge screen that was showing everyones email log in and password. The password would have a star or two covering random letters.
The point was if you logged in at any hotel they cracked that shit in seconds and had it up on a scrolling screen.
There were more then a few "secure" addresses up there!


Nah... that's not correct rob....

Encryption when implemented properly is a road block even for the highest levels of our government. At the very least it is not trivial.
 
Something of importance to note here.

The feds will always be able to get your email headers revelaing your IP address, then subpeona to reveal the owner of that IP address and then install a keylogger as I beleive they did in this case - therefore exposing your encypted emails because they have your passphrase.

T.OR or another truely secure privacy proxy can prevent the feds from ever getting to the point of indentifying you or your physical location, preventing the possibility of a keylogger, preventing the possibility of a decrypting your emails, preventing indictment.

If Osoca had used T.OR the entire chain of events outlined in the indictment would have fell apart from the get go - because it began with the feds getting his IP from his email headers - everything else was reliant upon that key peice of information.

Obviously, if I was trying to avoid such situations - I'd take even more steps to secure my identity. But that was key to this indictment....
 
jh1 said:
Something of importance to note here.

The feds will always be able to get your email headers revelaing your IP address, then subpeona to reveal the owner of that IP address and then install a keylogger as I beleive they did in this case - therefore exposing your encypted emails because they have your passphrase.

T.OR or another truely secure privacy proxy can prevent the feds from ever getting to the point of indentifying you or your physical location, preventing the possibility of a keylogger, preventing the possibility of a decrypting your emails, preventing indictment.

If Osoca had used T.OR the entire chain of events outlined in the indictment would have fell apart from the get go - because it began with the feds getting his IP from his email headers - everything else was reliant upon that key peice of information.

Obviously, if I was trying to avoid such situations - I'd take even more steps to secure my identity. But that was key to this indictment....


I missed the money on this. As the investigators always say - follow the money.

They would have identified this guy via the greendot money transfers eventually as well.
 
BigGuyPHX said:
I am so fucking sick of this bullshit!!! I will not live in fear!!! If you fuckers are reading this you can lick my steroid taking ass!!! I will not live in fear!!! This is MY body not yours and I WILL do with it as I want to!!! I will not live in fear!!! Read my email, listen to my cellphone calls, take pictures of me running red lights and I STILL WILL NOT LIVE IN FEAR!!!

FUCK YOU AND HAVE A NICE DAY!!!

BigGuyPHX
FUCKING A: I second that motion. the feds and any other LE can kiss my fucikng ass too. Get a fucking life and leave us hard working law abiding citizens who only live for one thing: Getting a good workout in after work and going home and taking care of our kids and families. Fuck ya'll, other than ordering a few cycles here and there for personal use, we don't bother anyone. So, if it's such a fucking crime to feel good about yourself, have good workouts, and look good in tight tee shirts, then for all means.... come fuck with me you cocksuckers.
 
Top Bottom