On 17/03/07, Thaths <[EMAIL PROTECTED]> wrote:
On 3/17/07, ashok _ <[EMAIL PROTECTED]> wrote:
> The person is not technically very competent they want something
> simple...I suggested that they post via email (using gmail /
> hushmail...) to either a blogger.com / wordpress type blog...  How
> secure would you think that is?

He needs to become a little tech savvy. I recommend http://tor.eff.org/

The very fact that someone uses Tor could be reason enough for his/her
convenient disappearance. I'd say an SSH session into a Unix box
somewhere followed by a links/lynx session is the safest (still
vulnerable to keystroke loggers though). Anything else can possibly
leave behind cache files etc. that can be used by suspicious people in
power.

Binand

Reply via email to