Saw that just today. But, AFAICT, it's still your best bet, unless you want
to run your own overseas server farm...

Kurt

On Mon, Jun 24, 2013 at 5:24 PM, Andrew S. Baker <[email protected]> wrote:

> re: TOR
>
>
> http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-hide-your-location-piques-nsas-interest-in-you/
>
>
>
>
>
> *ASB
> **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>*
> **Providing Virtual CIO Services (IT Operations & Information Security)
> for the SMB market…***
>
>
>
>
> On Fri, Jun 21, 2013 at 4:10 PM, Kurt Buff <[email protected]> wrote:
>
>> On Fri, Jun 21, 2013 at 12:08 PM,  <[email protected]> wrote:
>> > Even easier...just type a draft email message, save it, give friends the
>> > login details for your account, they can read and add to the draft. No
>> email
>> > ever sent and lots faster than snail mail. Popularized by criminals and
>> > General Petraeus, IIRC
>>
>> Even assuming the web mail service doesn't share details of the actual
>> messages (an iffy proposition at best), the metadata will still give
>> you away - after all, gmail and all the others track the IP addresses
>> that log into the account, and those are still very traceable.
>>
>> You have two alternatives that I can think of off the top of my head
>> to try to make this kind of scheme work:
>>
>> o- Use IPv6 exclusively (probably not viable)
>>
>> o- Use TOR (which is very slow, but if opsec is a priority, then
>> you'll need to tolerate it)
>>
>> Kurt
>>
>>
>>
>

Reply via email to