Latest posts

Forum Statistics

Threads
27,634
Posts
542,723
Members
28,580
Latest Member
Rolanalon
What's New?

Email providers..Securenym, Countermail, Safe-mail, etc.

pux888

pux888

MuscleHead
Oct 1, 2010
1,256
65
Sounds good Slic...Looks like you have all the popular ones Im familiar with and then some.
 
captaincaveman

captaincaveman

TID Board Of Directors
Oct 17, 2010
1,301
485
Here's the ones I'm going to critique:

1. Hushmail et al
2. Keptprivate
3. Securenym
4. Countermail
5. Safe-Mail
6. Anonymous Speech
7. S-mail
8. Mutemail
9. Neomailbox
10. Cryptoheaven

Is there any secure email services I missed? Please let me know if there are. If no one replies the above will be the ones I will critique. I'm only going to do this once.

Slic.

I automatically start Mozilla Firefox in "private browsing session" mode. I can not log in to my SECURENYM account. However, I can log in to my Countermail. Securenym uses cookies...Countermail uses Java, I believe. Me no like cookies. :)

-CC-
 
captaincaveman

captaincaveman

TID Board Of Directors
Oct 17, 2010
1,301
485
Heard bad things about hush-mail amongst other forums....

Pulled from another board some months back to a HUSHMAIL user. 'Nuff said.
> Dear Sir/Madam,
> > Thank you for your phone call and email.
>> Our Abuse Team is currently cooperating with RCMP "E" Division
and
> Interpol.
>> We regret to inform you that your account has been terminated following
> investigation by our Abuse Team into connection with the supply or
> distribution of scheduled drugs and misuse of Hush communications.
> > For additional information, please refer to:
> > https://www.hushmail.com/terms/premium
> "If there is any indication that you are using your account for illegal
> activity, your account will be terminated immediately and without
> notice. Activities that are absolutely not tolerated include the
> purchase or sale of substances that are illegal in many jurisdictions."
> > > Sincerely,
> > Network Operations
> Hush Communications
 
captaincaveman

captaincaveman

TID Board Of Directors
Oct 17, 2010
1,301
485
Received my countermail two pack USB option. Nice presentation....had a neckband with clasp to hold USB key around my neck if needed. Wanna see pics? :)
 
captaincaveman

captaincaveman

TID Board Of Directors
Oct 17, 2010
1,301
485
Sweet...and yes, I still want the girlfriend pics PMed, lol

Not really what the thread is about....but I dont have any new pics of my gf yet. Just an update. I hear if you disappoint Gettin' Some you might get busted down to NEWBIE FIRST CLASS MEMBER or something worse... LOL!!!
 
F

fivestar

New Member
Dec 10, 2010
8
1
Been using countermail with USB key for a while and will stick with it.

here is a question that someone I know sent them.

Hi if you were forced to turn over records for a email account do you cooperate with the government like hushmail did.

Thanks.

Hi,

Every company in the world is required to follow the laws of the country they are in. However, in Sweden we do not have the same laws as Canada and USA.

- -We do not have to log ip addresses, so we don't do that.
- -We do not have to store decryption keys, so we don't do that. We can't decrypt the email body of any encrypted message.


Best Regards
CounterMail.com
 
marx

marx

MuscleHead
Sep 29, 2010
4,671
626
I'll wait for slicwilly to share what he knows but so far countermail is looking pretty good...
 
usa

usa

MuscleHead
Dec 24, 2010
272
33
Which ever e-mail you decide to use. I would use some type of proxy. My fav is JonDoNym. We really would not have to worry about using any so called "anonymous" e-mail systems if everyone would just use PGP and a proxy with multiple encrypted cascades.
 
F

fivestar

New Member
Dec 10, 2010
8
1
Good point seems like people are just lazy to use PGP.



Which ever e-mail you decide to use. I would use some type of proxy. My fav is JonDoNym. We really would not have to worry about using any so called "anonymous" e-mail systems if everyone would just use PGP and a proxy with multiple encrypted cascades.
 
Bowhunter

Bowhunter

Senior Member
Oct 12, 2010
149
2
Here's the ones I'm going to critique:

1. Hushmail et al
2. Keptprivate
3. Securenym
4. Countermail
5. Safe-Mail
6. Anonymous Speech
7. S-mail
8. Mutemail
9. Neomailbox
10. Cryptoheaven

Is there any secure email services I missed? Please let me know if there are. If no one replies the above will be the ones I will critique. I'm only going to do this once.

Slic.

This sounds like some good info that would be of value to all members here. I'd add in maybe some PGP-101 for dummies as well. I'm by no means a techie.
 
usa

usa

MuscleHead
Dec 24, 2010
272
33
IMHO Cryptoheaven is a little gem I have kept to myself for a while. But since the cat is out of the bag. I think you all should check them out.
 
captaincaveman

captaincaveman

TID Board Of Directors
Oct 17, 2010
1,301
485
Great info from another board. This is a great reply to a subscriber's questions and is similar to others I have seen from admin at securenym.
-CC-
-------------------------------------------------------------------------------------------------------------

>Where are your servers located? If in the USA , the US Gov can
>force you to give up info like they did for Hushmail correct?
>
>Your program may not send out personal info but does it collect it
>as in you know who signed up for your Service and the method you use
>to collect payment stores info... Correct?

Your message was forwarded to me by one of our administrators. As one
of SecureNym's owners, I wanted to take the time to answer your
questions personally.

SecureNym has gateway servers in the US and our database servers are
located in Canada. We have a backup location, for emergencies, in
Nassau, Bahamas.

A government can certainly try to force us to provide information, as
can anyone else via legal proceedings. They do so all the time. Some
of the subpoenas are quashed immediately, due to errors or
incompetence. Those that survive the initial scrutiny from our
attorneys have not been a problem to date.

SecureNym, from day one ten years ago, chose a much different
security model than Hush. The whole premise of our security is that
we cannot be forced to reveal what we don't know. Ignorance is a
simple, and very reliable, defense that has served both our users and
us quite well.

We do NOT have any way of knowing who has what account. When a user
receives an account creation key, and enters it into our system, the
key is securely deleted BEFORE the user is directed to the account
creation page. Thus, the connection between an account key and a
specific account never exists. This is why we admonish users to be
sure to complete the process immediately, because otherwise we have
no way of recovering the key.

This means that it might be possible for someone to discover the
user's payment to SecureNym, via financial records at a credit card
company, but there is no way to prove that the account key was even
used, much less what account it might have been used to create. A
payment is circumstantial evidence, at very best.

Next, we have no way of recovering a password. SecureNym uses a
Catch-22 to make sure that we can't do so, and that no one else could
either. All passwords are encrypted and stored in our databases. The
decryption key is a cryptographic 'hash' of the account name and
the...... password. In short, you must know the password to decrypt
the password.

Your messages are all encrypted with that same cryptographic hash, on
the fly, as they arrive at our servers. The same rule applies; the
messages can be decrypted ONLY with the user's account name and password.

God knows, we've defended our security practices in countless legal
proceedings. So many that government agencies rarely bother trying
anymore. The fact is that our security protects us just as much as it
protects our users. If it were ever to be proven that we could access
the information we claim we can't, we'd face some very serious
contempt and perjury charges.

As a defense, ignorance must be absolutely demonstrable and provable.
Ours is, and has withstood legal scrutiny many times.

Hushmail gave up information that they should have never had, plain
and simple. Once you have it, you don't have much choice in the face
of a proper subpoena. And once it's been proven that you have
information, it's almost impossible to turn off the information tap
without being charged with obstruction of justice. The solution is to
NEVER have anything.

SecureNym was subpoenaed at exactly the same time as Hush was. We
fought the subpoena, and beat it, so it didn't get far, but Hush just
submitted. The agencies involved even tried to force us to change our
programming, to facilitate their efforts. That's illegal, by any
standard, so our attorneys were able to stop this before it got off
the ground.

We can only speculate as to why Hush chose not to fight for their
users, but they did not.

In the end, it comes down to the business objective. Hush wants to go
public one day, and has accepted money from venture capitalists
toward that end. This is a slippery slope, and once you step foot on
it, things can go downhill rather quickly.

Investors don't like controversy, such as is provided by fighting the
DOJ. This is evidenced by the fact that most public companies will
furnish anything the government wants, often without even a subpoena.
ATT, AOL, and countless others fall into this category of gutless wonders.

SecureNym has had ample opportunity to be either acquired or diluted
with money from investors, such as Microsoft. SecureNym is privately
owned, and is going to stay that way. There are three principals, two
Americans and one Canadian. We have never accepted investments from
anyone, nor will we, because the day we do, we start losing control
of our company, and our security.

When that happens, you can no longer give your users what they pay
you to provide.

I hope this helps answer your questions.

Admin
SecureNym.net
 
Who is viewing this thread?

There are currently 0 members watching this topic

Top