Saw that just today. But, AFAICT, it's still your best bet, unless you want to run your own overseas server farm...
Kurt On Mon, Jun 24, 2013 at 5:24 PM, Andrew S. Baker <[email protected]> wrote: > re: TOR > > > http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-hide-your-location-piques-nsas-interest-in-you/ > > > > > > *ASB > **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>* > **Providing Virtual CIO Services (IT Operations & Information Security) > for the SMB market…*** > > > > > On Fri, Jun 21, 2013 at 4:10 PM, Kurt Buff <[email protected]> wrote: > >> On Fri, Jun 21, 2013 at 12:08 PM, <[email protected]> wrote: >> > Even easier...just type a draft email message, save it, give friends the >> > login details for your account, they can read and add to the draft. No >> email >> > ever sent and lots faster than snail mail. Popularized by criminals and >> > General Petraeus, IIRC >> >> Even assuming the web mail service doesn't share details of the actual >> messages (an iffy proposition at best), the metadata will still give >> you away - after all, gmail and all the others track the IP addresses >> that log into the account, and those are still very traceable. >> >> You have two alternatives that I can think of off the top of my head >> to try to make this kind of scheme work: >> >> o- Use IPv6 exclusively (probably not viable) >> >> o- Use TOR (which is very slow, but if opsec is a priority, then >> you'll need to tolerate it) >> >> Kurt >> >> >> >

