Or of course, using the keylogger capture the email before it is encrypted.
On Thu, 12 Oct 2006 20:29:39 -0500 patgus <[EMAIL PROTECTED]> wrote: > Well that should work. PGP offers more of an illusion of security than most > people realize. If someone knows whos email they want to read, and can find > you online. All they have to do is hack into your computer, steal your > keyfile, and install a keylogger to capture your password, and blam - no more > encrypted email. > Of course this is easier said than done, but still quite possible. To be > totally safe you would have to use PGP on a computer that was not connected > to a network. You could do this with your method. > > On Thu, 12 Oct 2006 17:45:47 -0700 > "Total Privacy" <[EMAIL PROTECTED]> wrote: > > > > > On Wed, 20 Sep 2006 18:43:41 +1000, "glymr" <[EMAIL PROTECTED]> said: > > > yes, port 25 is blocked by most tor exit nodes. however, some webmail > > > services (notably gmail) use different ports and are usable from tor. > > > > How about this; > > > > Using PGP or similar to make an encrypted file (txt or word or something). > > Then attach it to an ordinary webmail upload function, to send it over to > > the recipient that alreday are informed of my public key (and who´s key I > > have). All this whitout any need for Thunderbird or anything in computer. > > > > Anyboby tried this successfully? > > > > > > > > -- > > http://www.fastmail.fm - The professional email service > > > > > > > > > >

