Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

FEDS have access to HUSHMAIL READ

Plantro said:
Just throwing it out there, but GLP was busted. Who's to say that he didn't cooperate and give his password (and therefore key) to the DEA who used that and MLAT to read all emails that were sent to/from his account? In that manner, the DEA could subpoena the encrypted email transactions and used the keys they got from GLP's email addy to decrypt them. So they may not have the ability to get every hushmail they want decrypted, only the emails to which they got a password to get into. Honestly not a computer guru, but anyone who is could let me know if the above holds water.

I think you nailed it.
 
digger said:
I think you nailed it.

that might explain GLP, but not OSOCA (the link in the first post)- his indictment indicates the emails were obtained and read while he was still under investigation, before he was arrested.

The only thing that would explain OSOCA is a compromise of hushmails implementaion of PGP, a keystroke recorder on OSOCAs machine that captured his passphrase, or that he was sending cleartext emails from hush to non-hush recipients.

the official open-source verifiable version of PGP doesnt have to be compromised or have a backdoor, only Hushmails implementation of it. As far as I've read, it doesnt look like Hush has any 3rd party independent audit/confirmation of the version of PGP they use and how they implemented it (mods, tools etc).
 
Mavafanculo said:
that might explain GLP, but not OSOCA (the link in the first post)- his indictment indicates the emails were obtained and read while he was still under investigation, before he was arrested.

The only thing that would explain OSOCA is a compromise of hushmails implementaion of PGP, a keystroke recorder on OSOCAs machine that captured his passphrase, or that he was sending cleartext emails from hush to non-hush recipients.

the official open-source verifiable version of PGP doesnt have to be compromised or have a backdoor, only Hushmails implementation of it. As far as I've read, it doesnt look like Hush has any 3rd party independent audit/confirmation of the version of PGP they use and how they implemented it (mods, tools etc).


They could have read the emails after the arrest, after the possibility of OSOCA giving up the keys existed.

Obtaining emails from hush prior still provides momentum to the investigation since you know whom he is speaking with - in this case at least one well known raw materials supplier.

Either that or the keylogger route - as used the MDMA case.

Ownded.
 
I'm using my new email.... smoke signals like the indians.... and they are encrypted sukas!!!!! how's that LE?! heheheh lol
 
if they do have access.. no matter what they have backup tapes that would also be able to be searched for evidential actions
 
Top Bottom