I did some checks on hushmail to see if it had changed. When you use the version that encrypts your mail on your machine there is a program that is loaded to do this encrypting. When gear grinder came down I went in my cache and pulled out an old version. I ran an md5sum on this version. I then pulled the one that loads currently. I ran an md5sum on the new one. This will tell me if there has been any change that would allow someone to see your email, assuming the oldest one did not allow anybody to snoop. Both md5sums were the same. This shows that there has been no tampering with the code that does the encryption.
I did this because there was rumor that hushmail had changed it's code to allow IE to see your mail. It turns out that this rumor is untrue.
It's NO rumour -- it's true, and there is documentation to back it up.
No less than three times has it been documented that government and/or law
enforcement compelled Hushmail to give up information on its users:
* The Drug Enforcement Administration's "Operation Raw Deal" where Hushmail
was forced to give up 12 CDs full of decrypted email on their users.
According to media reports, a DEA spokesman actually boasted that the DEA
had collected "hundreds of thousands" of email messages on an unspecified
number of suspects.
See: www <dot> parrhesia <dot> com/stumbo_complaint <dot> pdf
* The U.S. Secret Service managed to nab Max Butler a.k.a. Iceman, for credit card fraud. Butler, who by day was a $110/hour security consultant, moonlighted as "Iceman". One of Iceman's email accounts was: digits @ hushmail <dot> com
See: www <dot> wired <dot> co <dot> uk/magazine/archive/2011/03/features/the-card-master?page=all
* Thomas Andrews Drake, an NSA whistleblower, was charged with leaking documents to a Boston Globe reporter. Both the reporter and Drake were using Hushmail accounts. Once again, the U.S. government invoked MLAT to get the decrypted emails between these two parties.
See: www <dot> informationweek <dot> com/news/storage/data_protection/224400411
Fidel