The Old Vet said:Encrypted E-mail is in no way safe. The feds can get a tap into that quicker than shit.
worldclass said:Secure mail is only secure from hackers and private individuals looking to steal your identity, not the government. The DEA can ask for copies of your email from the "secure mail" providers and they will get it.
Svengali said:From hushmail's website:
What if Hush receives a court order to release the contents of my account?
Hush Communications maintains its servers in British Columbia, Canada. Hush Communications complies fully with valid court orders issued by the courts of British Columbia, Canada. In order to ensure consistent treatment of all users, Hush Communications does not accept court orders from other jurisdictions. However, law enforcement agencies from other jurisdictions may pursue action through international channels compliant with the laws of British Columbia and Canada, resulting in a court order being issued by a court of British Columbia.
xrsist said:dont belive everything you read people the government can and will do what they want, when they want, how they want and will tell you what you wanna hear..
xrsist said:dont belive everything you read people the government can and will do what they want, when they want, how they want and will tell you what you wanna hear..
slat1 said:The bust that was announced yesterday they spoke about having all the "secure/encrypted" emails from end users to the labs.
Its a joke.
Access said:I read a DEA report recently where they stated it was very difficult to get any real data from Hushmail accounts because they wipe the originating IP before sending the message and replace it with the server IP which is located in Ireland (which I did not know). So I think these encrypted accounts might be reasonably safe. I am sure the govt. if need be could unencrypt these e-mails but I doubt there going to go to that length somehow. Also with the servers being located offshore does make them have to go through more hurdles to get any information they want.
perryscoon said:All the emails in the world don't prove a thing until they find gear.
Think about this guys.
You walk up to a cop on the corner and say, "I have a huge bag of cocaine at my house." The cop will either think you're a loon and tell you to away, or he'll arrest you and go get a warrant to search your house. Say he gets a warrant and searches your house and finds nothing. What charges could they possibly file? Pretending to possess coke? lol
But this of course is rediculous because rappers say they have killed people, dealy drugs, pimped hoes, stolen cars, etc. in their songs all the time and you don't see the feds running to arrest them for saying things like that do you?
I think that at best, they could try to give you an "attempting to purchase anabolic steroids" charge if all they could find was emails. And even then, they would have to prove that YOU wrote the emails, which is impossible.
worldclass said:Secure mail is only secure from hackers and private individuals looking to steal your identity, not the government. The DEA can ask for copies of your email from the "secure mail" providers and they will get it.
digger said:Hush is basically a Java front end for PGP -- training wheels, in other words. PGP is "Pretty Good Privacy." The guy who wrote it didn't make grandiose claims about it, but it's better than anything from WWII.
Here are a few basics -- your key, your passphrase, has got to be LONG and COMPLEX. A program can run through all the possible combinations of eight or ten letters in a few minutes. "Yo mama" is not a good passphrase, in other words. Unless you have to type for a full four seconds to enter your passphrase, you're wasting your time using PGP. All that does is call attention to your mail without really protecting it.
The feds no doubt have tricks that would make a mere mortal like me faint dead away. But the local PD? You're dealing with some guy who took a two-day forensics course at community college. He'll try a list of stupid passwords, and if you were stupid enough to use one of them, he's in; but if your passphrase is as long as it should be, then fuck, no, he's not going to break PGP. The guy who wrote PGP spent ten years fighting to stay out of jail; he didn't do that just so someone could backdoor it.
On the other hand, spammers now "own" a third of the PC's on the planet. That's because it's trivial to turn a Windows PC into the bitch of some Russian Mafia pimp. Anyone who says "I use Garbage-O and it makes Windows safe!", I call bullshit. It's got to be at least that easy for the FBI.
Also, if you only encrypt some of your email it's just like saying "Here's the good stuff! Focus on this message right here!" The Man calls that traffic analysis, but it's just a matter of figuring out "Who have you been talking to?" and then they go talk to that person. What do you get when you add one smart person and one stupid person? Two stupid people.
I know that we have a guy here who worked on the EFF's (Electronic Frontier Foundation) anonymity system, which sounds wonderful but it's run by volunteers. "Gee, what's the easiest way to get my hands on a stack of internet traffic from people who think they have something to hide?" You got it -- become one of those volunteers. Press report earlier this month, guy used his insider status to read tons of unencrypted messages that were delivered straight to the "nodes" he contributed to the project.
The people using the anonymity service didn't understand the difference between anonymity and encryption. You need BOTH.
(By the way -- the only people who have used the EFF system here have been spammers and trolls, trying to get around being banned. It doesn't even help them with that; it just makes them stick out more.)
So... follow GJ's suggestion and learn how to use PGP without the training wheels.
Ditch Windows. Get a Linux "live CD." You have to keep records? Don't save anything to your hard drive. Save stuff to a thumbdrive and encrypt the hell out of it -- PGP can do that once you learn how to use it.
Hushmail is a hell of a lot better than nothing, and the people talking it down are mostly blowing smoke; it's just not the whole solution.
digger said:I know that we have a guy here who worked on the EFF's (Electronic Frontier Foundation) anonymity system, which sounds wonderful but it's run by volunteers. "Gee, what's the easiest way to get my hands on a stack of internet traffic from people who think they have something to hide?" You got it -- become one of those volunteers. Press report earlier this month, guy used his insider status to read tons of unencrypted messages that were delivered straight to the "nodes" he contributed to the project.
The people using the anonymity service didn't understand the difference between anonymity and encryption. You need BOTH.
LAN T said:With a warrant they can, but not without one. This is still the USA.
Mavafanculo said:even assuming no backdoor to the version of PGP that Hush is using (more on that below) a weak link is their use of the java front end to perform the encryption. Java has direct access to your machine's IP and bypasses any proxy settings and ( so far) any anonymizer software. and Hush then logs that IP linking you to your accouint and emails.
They indicate on their site you now have a No-java option, but I cant find it (unless you just turn off java in your browser settings and hush then figures out what to do from there). With this option, you'd be vulnerable to a man-in-the-middle attack or data sniffing (since the email isnt encrypted until it gets to the Hush servers) but you'd have to already be the subject of an investigation for that to be an issue in which case ur fucked anyway.
jh1 said:If the feds want to run a node on T.OR they are more than welcome too do so. It was designed with this possibility in mind, it only provides anonimity for the transport and the shielding of the actual client. I invite the feds to run as many nodes as they want, including exit nodes. Being a node or many nodes won't give you enough information - you only know the IP of the previous and next hop - not the contents of the communication nor the orginal source or the final destination.
It is encrypted by the way, from the client all the way to the exit node.
Mavafanculo said:is there a possible backdoor to PGP?? seems to depend on the version from the reading below. is there a 3rd party independent audit of the PGP version and its implementation Hushmail is using??? probably not.
here's some interesting links
http://www.rossde.com/PGP/pgp-adk.html
PGP: Additional Decryption Key (ADK)
http://www.wilderssecurity.com/archive/index.php/t-16578.html
PGP has a backdoor in for the government?
http://seclists.org/politech/2001/Jan/0063.html
NA fesses up to backdoor?
jh1 said:If you are trying to avoid your computer's IP being logged then you have to use a proxy and that holds true for hush or if you use your own standalone implementation of PGP. That's not specific or unique to PGP. .
Mavafanculo said:128? 256? blowfish? pgp?
Mavafanculo said:re IP anonymity, the web browser use of java by Hush is the prob, not PGP (assumming no backdoor) . even if you use proxy software Hushs Java applet ignores the settings and passses your actual IP to hush -
so either use a non-java web version or other non java implementation like you described
jh1 said:I don't know if that's the case or not, but regardless - most peoples local machine IP's don't reveal much as they are private IPs that are NAT'd at a gateway somewhere.
For example, my IP right now is 10.0.0.100. Come find me.
As far Java Applets and anonimity - there are ways to address that as well - through sandboxing java / entire browser environments - or even entire OS virtual machines.
Mavafanculo said:i misspoke - the local machines IP if not behind a router, or the router IP assuming a simple home network - thats enough to go to your isp and get subscriber info.
I dont know what would be the case in a complex corporate net gateway setup
Trendsetter21 said:Like already stated there is no secure email. If persay you were looking to do this stuff an have minimal chance to get caught this is what you do. (This guy at the gym told me about his routine when he was trying to get me to order stuff, but I won't take steroids illegally, I will do HRT next year though)
1. Get a cheap laptop from someone in the paper or whatever. They won't know ur name or anything.
2. Make sure it has a wireless card, then be sure to drive around until you can find a connection.
3. Place your order and only use that computer and different connections in different locations when you want to check those emails lol.
4. Do not leave the computer at your house obviously, if you can leave it with a trusted person that you don't call with your landline or cell phone. This makes it almost impossible to tie orders to you because they can't find the computer you did stuff with. Even if they use the dealer's how are they going to prove it actually is you if its not your ip address and there is no hard evidence tying you to it.
5. Western union money with fake names and addresses and stuff obviously
The only trace to you is obviously the substance but if you dont' have it at your place either theres really nothing tying you to anything. It really isn't that easy to get a warrant and borrowing other peoples internet with a computer that you don't have at your residence will make it impossible to tie stuff to you. It sounds pretty secure, any other ideas? His idea seems very good, and anyone that is too lazy to go the extra 100 miles should also remember the consequences that can happen. All I know is if I was doing this stuff. I would make sure I had every i dotted and t crossed lol.
Trendsetter21 said:Like already stated there is no secure email. If persay you were looking to do this stuff an have minimal chance to get caught this is what you do. (This guy at the gym told me about his routine when he was trying to get me to order stuff, but I won't take steroids illegally, I will do HRT next year though)
1. Get a cheap laptop from someone in the paper or whatever. They won't know ur name or anything.
2. Make sure it has a wireless card, then be sure to drive around until you can find a connection.
3. Place your order and only use that computer and different connections in different locations when you want to check those emails lol.
4. Do not leave the computer at your house obviously, if you can leave it with a trusted person that you don't call with your landline or cell phone. This makes it almost impossible to tie orders to you because they can't find the computer you did stuff with. Even if they use the dealer's how are they going to prove it actually is you if its not your ip address and there is no hard evidence tying you to it.
5. Western union money with fake names and addresses and stuff obviously
The only trace to you is obviously the substance but if you dont' have it at your place either theres really nothing tying you to anything. It really isn't that easy to get a warrant and borrowing other peoples internet with a computer that you don't have at your residence will make it impossible to tie stuff to you. It sounds pretty secure, any other ideas? His idea seems very good, and anyone that is too lazy to go the extra 100 miles should also remember the consequences that can happen. All I know is if I was doing this stuff. I would make sure I had every i dotted and t crossed lol.
jh1 said:![]()
LOL @ Fake Addresses......
Yeah I see a huge fatal error in your plan.
Trendsetter21 said:I'm pretty sure from what I've seen posted you never put your real address on western union forms, when you send the western union number thats when you are supposed to give shipping addresses. At least that would make sense, like I stated I've never done this.
Trendsetter21 said:I'm pretty sure from what I've seen posted you never put your real address on western union forms, when you send the western union number thats when you are supposed to give shipping addresses. At least that would make sense, like I stated I've never done this.
jh1 said:Honestly, there's alot of uncessary paranoia in your plan. The way these labs were busted and the fact that they got their emails blows your entire plan apart as a consumer.
As far as fake addreses. How do you plan to receive your ster.oids?
Fraud is always a great charge to add onTrendsetter21 said:Like already stated there is no secure email. If persay you were looking to do this stuff an have minimal chance to get caught this is what you do. (This guy at the gym told me about his routine when he was trying to get me to order stuff, but I won't take steroids illegally, I will do HRT next year though)
1. Get a cheap laptop from someone in the paper or whatever. They won't know ur name or anything.
2. Make sure it has a wireless card, then be sure to drive around until you can find a connection.
3. Place your order and only use that computer and different connections in different locations when you want to check those emails lol.
4. Do not leave the computer at your house obviously, if you can leave it with a trusted person that you don't call with your landline or cell phone. This makes it almost impossible to tie orders to you because they can't find the computer you did stuff with. Even if they use the dealer's how are they going to prove it actually is you if its not your ip address and there is no hard evidence tying you to it.
5. Western union money with fake names and addresses and stuff obviously
The only trace to you is obviously the substance but if you dont' have it at your place either theres really nothing tying you to anything. It really isn't that easy to get a warrant and borrowing other peoples internet with a computer that you don't have at your residence will make it impossible to tie stuff to you. It sounds pretty secure, any other ideas? His idea seems very good, and anyone that is too lazy to go the extra 100 miles should also remember the consequences that can happen. All I know is if I was doing this stuff. I would make sure I had every i dotted and t crossed lol.
Well the thing is, it would happen immediately, they have tons and tons of emails and info to go through.sincere81oo0 said:why are you guys freaking out still???? has anyone had aknock at there door yet?? when they start knocking on doors for personal users then worry me, but as of now there are no reports of this correct?? stop bugging out, unless your erdering a couple hundred bottles for resale or something i dont think they are going to waste there time..... personal use is like with any other drug, not sure what they can ge you on but even when people get busted with persoanl stash of drusgs they usually go to rehab..... i would really like to see how they handle personal abuse of steroids in the courtroom lmao.... think they will send bros to rehab??? lol lets see when it happens....
Mavafanculo said:With this option, you'd be vulnerable to a man-in-the-middle attack or data sniffing (since the email isnt encrypted until it gets to the Hush servers)
digger said:It's an https connection, and SSL isn't all that bad.
Mavafanculo said:no, it's not. I lapsed into Int'l Banking ass-covering mode for a second lol.
For what we're talking about here, the exposure isnt great I guess, and you'd already have to be the target of an investigation.
Last I recall to break a 128 bit it would probably take "...a large bank of supercomputers a few weeks....." or words to that effect.
I dont think the NSA will devote that to 100 dbols lol
-
jh1 said:Hushmail is still safe to use. Although I'd suggest using Open PGP at your desktop, if you are so technically inclined. There is still a way Law Enforcement will own you though read on...
Note that Hushmail must and will submit to subpoenas, but they don't have the ability to decrypt your mail (message bodies & attachments) so their response will include all your mail headers (To/From, Date/Time, Subject, IP Addy, Etc) in clear then an PGP encrypted mail body. At no time does Hushmail receive your passphrase.
If the feds are able to unencrypt, they will - but it is very doubtfull that such resources are brought to bear for a law enforcement issue over drugs. Typically such resources are found in the intelligence community - specifically the NSA and other federal agencies draw upon that pool - but it is highly unlikely the NSA would devote resources to such trival matters.
If you're getting owned by law enforcement on your encrypted mail, they have most likely owned your computer - so in that case, nothing will save you - you need to be more dillegent.
Here is a recent bust by the DEA over MDMA - they installed a keylogger to capture passphrases for a hushmail account:
http://www.news.com/8301-10784_3-9741357-7.html?part=rss&subj=news&tag=2547-1001_3-0-5
So if hushmail can provide clear text emails on administrative subpeonas - there is no way they'd bother to suripticiously install keyloggers. But that keylogger mentioned in the above article would own your ass no matter what you were doing to encrypt your communications.
Fidel_Castro said:The problem here is that people are confusing anonymity and privacy; they are two very different things. Hushmail provides privacy, but does not provide anonymity. If one is engaged in potentially illegal activities, it is necessary to be *both* anonymous and private.
PGP, as the name implies, is Pretty Good Privacy--it provides an excellent level of privacy, but in and of itself, does not provide anonymity. Anonymity is provided by anonymous remailers, of which there are currently two classes: cypherpunk and mixmaster. (There is a third class, mixminion, but it is still in an immature stage of development.)
Another specialized type of remailer is the nymserver; as its name implies, nymservers allow one to use PGP/GPG to setup a pseudonym, where one can send/receive email securely.
If one uses a chain of mixmaster remailers to setup/use a nymserver account, this effectively breaks the link between your own IP address and that of the nymserver.
The nymserver operator, even were they to be subpoenaed, would not have your IP address to give to the authorities. All that the nymserver operator has to give to the authorities are:
1) My PGP public key, and 2) my reply block.
In my case, my PGP key is 4096-bits, or twice the size of the 2048-bit keys used by Hushmail. Frankly, neither 2048 nor 4096 keys will be vulnerable any time in the near future. My reply block is a PGP-encrypted, specially-formatted text file. The reply block tells a remailer where to direct any replies that are sent to my nymserver account.
My nymserver account has been setup to send all messages to an anonymous message pool. In practice, this usually is the Usenet newsgroup alt.anonymous.messages. (This is just a high-tech version of the "dead drop" used in espionage tradecraft.)
I'll explain the rationale behind this choice a little further down.
Unlike Hushmail, the nymserver does not have my private PGP key. My private PGP key only exists on my hardware, where it was initially generated. Brute-force password attacks against my private key are not possible, since an attacker cannot get access to my private key. The fact that your private key is available to law-enforcement with Hushmail is why it is so important to use a strong passphrase on your Hushmail accounts, if you must use Hushmail.
Here's how the process works:
i) Someone sends me an email message; the nymserver takes this message and encrypts it with my public key;
ii) The nymserver takes the encrypted message, prepends the reply block to it, and forwards it to the target remailer associated with the reply block.
iii) the target remailer decrypts my reply block, and carries out the instructions found inside.
Let's assume for a moment that the nymserver operator were to be served with a warrant under MLAT and forced to hand over my PGP public key and reply block. All they would have is a public key with an address of say, [email protected] No clues to my real identity here. As for the reply block, it is encrypted to: [email protected] over in the Netherlands. So the authorities would have to get their Dutch counterparts to get a warrant and approach the remailer operator over there to decrypt the reply block.
So the replay.com operator takes the reply block from the police and decrypts it., like they asked. Here is the decrypted reply-block that the authorities get for all their time and trouble:
::
Request-Remailing-To: [email protected]
Encrypt-Key: blah_blah
Encrypt-Subject: dKBJDCd2tZqidpxiAJME9Q
##
Newsgroups: alt.anonymous.messages
Subject: I love paris in the the spring!
**
The Request-Remailing-To: line points to a mail2news gateway that posts to the Usenet group found in the Newsgroups: line, in this case alt.anonymous.messages.
The Encrypt-Key: directive tells the remailer to further encrypt the already-PGP- encrypted message with the symmetric IDEA cipher, using the string "blah_blah". The reason for this is to prevent any adversary from combing through the messages in alt.anonymous.messages looking for messages encrypted with my PGP public key.
Similarly, the Encrypt-Subject: directive, as the name implies, encrypts a hash of the message subject, thus ensuring that the Subject line showing up in alt.anonymous.messages changes constantly. This is to prevent an adversary sending say, 20 or 30 or 50 messages to my nym account and watching alt.anonymous.messages to see a spike the number of messages with a particular subject line.
In other words, these measures ensure that no attacker can determine which messages in the pool are mine by:
a) trying to see which messages are encrypted to my PGP public key; and
b) watching for messages with a particular subject line.
Now an investigator, who has obtained the decrypted reply block under warrant, _has_ sufficient information to determine which messages are mine in the anonymous message pool. Using a package like AAMfetch, they can insert the values found in the reply block and download all the traffic in the message pool associated with my nym account.
However, they still don't know who I am, or where I am located. They also still cannot read my messages, as they cannot break the PGP-encrypted messages.
In order to install a keylogger, they first have to be able to find you. The only way they could affect you without knowing who or where you are, would be to get you to carry out some action, for example, visit a trojaned web site, or trick you into installing some malware that would send your IP address, etc. to them.
For those interested in privacy, anonymity and techniques to accomplish this, I would recommend paying a visit to the Usenet newsgroup alt.privacy.anon-server. Dr. Who's FAQ is frequently posted there, and it is an excellent introduction to these subjects, particularly for Windows users. The latest version of Dr. Who's Encryption & Security FAQ (22.6.4) was posted on October 1st in alt.privacy.anon-server. The Message-ID: is: <[email protected]>. I have verified his PGP signature on this particular version. (If it has expired with your newsserver, it may still be available through Google Groups.)
Here is a link to another tutorial: http://www.iusmentis.com/technology/remailers/nym.html
Most of the information is accurate, although dated. In particular, nym.alias.net is NOT recommended any longer, as they haven't changed their public key in more than 10 years! (Nym.alias.net is/was a student project--it has been run by a succession of student admins over the years. It tends to be erratic, and heaven only knows how many copies of nym.alias.net's private key are floating around. Ten years ago it ws top-notch, today it is no longer recommended--there are other nymservers out there that are much better-administered.)
Finally, here's a link to a 96-page court document with respect to the MDMA bust and keylogger installation.
http://politechbot.com/docs/forrester.alba.dea.key.logger.070907.pdf
I could elaborate further, if anyone is interested. If anyone wants to email me, they can do so at: [email protected]. I've already uploaded the public key for this account to the hushmail key server.
Fidel Castro <[email protected]>
PGP-Key: 0x9703892
Fingerprint: CFF2 9E40 8C8B 8A03 14DB D51C 44A2 2578 0970 3892
Access said:I read a DEA report recently where they stated it was very difficult to get any real data from Hushmail accounts because they wipe the originating IP before sending the message and replace it with the server IP which is located in Ireland (which I did not know).
So I think these encrypted accounts might be reasonably safe. I am sure the govt. if need be could unencrypt these e-mails but I doubt there going to go to that length somehow.
Also with the servers being located offshore does make them have to go through more hurdles to get any information they want.
partagus said:I know a girl that works at the NSA. In casual conversation, I asked her if the NSA had the ability to get info and read encrypted e-mail. She just laughed at me. She said there is no suck thing as encrypted e-mail to the government, that they can get to it all.
Access said:Just to follow up this is on site also:
Does Hush/Cyber-Rights.Net have a "back door" that can be accessed by government agencies?
Email, which includes attachments, sent between Hush users is completely encrypted.
What if my message is subpoenaed?
Hush, like any company or individual, is legally bound to respond to court-issued subpoenas. However, because not even Hush can access the encryption keys of individual users, in the case of a subpoena Hush would only be able to provide the encrypted (coded) version of the transmitted email.
This page contains mature content. By continuing, you confirm you are over 18 and agree to our TOS and User Agreement.
Please Scroll Down to See Forums Below 










