Or of course, using the keylogger capture the email before it is encrypted.

On Thu, 12 Oct 2006 20:29:39 -0500
patgus <[EMAIL PROTECTED]> wrote:

>  Well that should work. PGP offers more of an illusion of security than most 
> people realize. If someone knows whos email they want to read, and can find 
> you online. All they have to do is hack into your computer, steal your 
> keyfile, and install a keylogger to capture your password, and blam - no more 
> encrypted email.
>  Of course this is easier said than done, but still quite possible. To be 
> totally safe you would have to use PGP on a computer that was not connected 
> to a network. You could do this with your method.
> 
> On Thu, 12 Oct 2006 17:45:47 -0700
> "Total Privacy" <[EMAIL PROTECTED]> wrote:
> 
> > 
> > On Wed, 20 Sep 2006 18:43:41 +1000, "glymr" <[EMAIL PROTECTED]> said:
> > > yes, port 25 is blocked by most tor exit nodes. however, some webmail
> > > services (notably gmail) use different ports and are usable from tor.
> > 
> > How about this; 
> > 
> > Using PGP or similar to make an encrypted file (txt or word or something). 
> > Then attach it to an ordinary webmail upload function, to send it over to 
> > the recipient that alreday are informed of my public key (and who´s key I 
> > have). All this whitout any need for Thunderbird or anything in computer. 
> > 
> > Anyboby tried this successfully? 
> > 
> > 
> > 
> > -- 
> > http://www.fastmail.fm - The professional email service
> > 
> > 
> > 
> 
> 
> 
> 


Reply via email to