Working on this new server in php7...
imc indymedia

Los Angeles Indymedia : Activist News

white themeblack themered themetheme help
About Us Contact Us Calendar Publish RSS
Features
latest news
best of news
syndication
commentary


KILLRADIO

VozMob

ABCF LA

A-Infos Radio

Indymedia On Air

Dope-X-Resistance-LA List

LAAMN List




IMC Network:

Original Cities

www.indymedia.org africa: ambazonia canarias estrecho / madiaq kenya nigeria south africa canada: hamilton london, ontario maritimes montreal ontario ottawa quebec thunder bay vancouver victoria windsor winnipeg east asia: burma jakarta japan korea manila qc europe: abruzzo alacant andorra antwerpen armenia athens austria barcelona belarus belgium belgrade bristol brussels bulgaria calabria croatia cyprus emilia-romagna estrecho / madiaq euskal herria galiza germany grenoble hungary ireland istanbul italy la plana liege liguria lille linksunten lombardia london madrid malta marseille nantes napoli netherlands nice northern england norway oost-vlaanderen paris/Île-de-france patras piemonte poland portugal roma romania russia saint-petersburg scotland sverige switzerland thessaloniki torun toscana toulouse ukraine united kingdom valencia latin america: argentina bolivia chiapas chile chile sur cmi brasil colombia ecuador mexico peru puerto rico qollasuyu rosario santiago tijuana uruguay valparaiso venezuela venezuela oceania: adelaide aotearoa brisbane burma darwin jakarta manila melbourne perth qc sydney south asia: india mumbai united states: arizona arkansas asheville atlanta austin baltimore big muddy binghamton boston buffalo charlottesville chicago cleveland colorado columbus dc hawaii houston hudson mohawk kansas city la madison maine miami michigan milwaukee minneapolis/st. paul new hampshire new jersey new mexico new orleans north carolina north texas nyc oklahoma philadelphia pittsburgh portland richmond rochester rogue valley saint louis san diego san francisco san francisco bay area santa barbara santa cruz, ca sarasota seattle tampa bay tennessee urbana-champaign vermont western mass worcester west asia: armenia beirut israel palestine process: fbi/legal updates mailing lists process & imc docs tech volunteer projects: print radio satellite tv video regions: oceania united states topics: biotech

Surviving Cities

www.indymedia.org africa: canada: quebec east asia: japan europe: athens barcelona belgium bristol brussels cyprus germany grenoble ireland istanbul lille linksunten nantes netherlands norway portugal united kingdom latin america: argentina cmi brasil rosario oceania: aotearoa united states: austin big muddy binghamton boston chicago columbus la michigan nyc portland rochester saint louis san diego san francisco bay area santa cruz, ca tennessee urbana-champaign worcester west asia: palestine process: fbi/legal updates process & imc docs projects: radio satellite tv
printable version - js reader version - view hidden posts - tags and related articles


View article without comments

Email Privacy and Security

by resist Tuesday, Sep. 23, 2003 at 10:03 AM

There are a number of different aspects to secure email and/or anonymous email access. This section is designed to explore the different options available to you for secure email access, as well as when and how to use anonymous email.

Secure Connections for Email Access

Securely connecting to your shell or email service is the first step in protecting yourself from unwanted "sniffers" that may be hanging out in one of the various internet gateways between your home and your server. There are programs that operate to "sniff" out unencrypted passwords and logins, giving a third party access to your account and files stored in your home directory. Sniffers may be set up by malicious hackers, or by government agencies looking for specific file access.

Using a secure shell program, rather than telnet is one way to encrypt this information as it travels back and forth. For more information on Secure Shell programs available to you, check out our page on secure shell.

Other Email Encryption

PGP Encryption is the best way to keep your e-mail private & secure. Get PGP now and learn how to use it.

Anonymous Email

There may be times when you want to conceal your real identity when you use the Internet. You may be protecting yourself against repressive governement messages, or want to post personal messages to a Usenet newsgroups without identifying yourself to the whole world as the person who posted it. There are, of course, issues with the use of anonymous email (ie: it may be difficult for the receivers to trust the message if they do not know where it's coming from), but, having said that, it is obvious that there are times when a sender can not reveal their identity for legal or other reasons.

Anonymous Remailers

These systems do one of two things. Either they give you an anonymous address, to which other people can send you mail, which is then forwarded to your real address (this is sometimes referred to as a pseudonymous server), or they post or mail your message without any trace of the sender's name or address.

Web Based Anonymous Remailers are a very convenient way to remail messages.

Cypherpunk Remailers, also known as "Type I" remailers, simply take your message, strip off all headers and send it to the intended recipient. This means that no one will be able to reply in e-mail to your message, but it gives you an almost untraceable way of sending messages.

Mixmaster Remailers, also known as "Type II" remailers, were designed to be even more secure than cypherpunk remailers. Most of the attacks that work against Type I remailers are useless against Mixmaster remailers. It requires a special client to compose messages.

Nym Servers are a type of pseudonymous remailer. Nym.alias.net is the most popular of this type.

Web-Based Free E-Mail Accounts

There are more and more free e-mail services popping up all over the world, many even give you several choices of domain names (like lawyer.com, etc).

E-mail services are adding more and more features to their email like secure SSL encrypted connections, voice mail, auto-responders, POP3 access, attachments, mail forwarding, mail collection from outside accounts, and more. When applying for these services do not use any real information if you wish to remain private and anonymous. The information is never checked by a real person unless your account is doing something naughty.

Mail sent via these services usually includes the Originating IP address of the host ISP (Internet Service Provider) you used to connect to their web page and if not the mailserver's logs will always have it. To increase your anonymity you should use a web proxy server to hide your IP address. In order to remain anonymous you must use a web proxy EVERY time you access your web based account. You could also connect from a cyber-cafe, library, etc.

In addition, there is no question that all data travelling through large free email servers such as hotmail and yahoo is sniffed and collected by the FBI, so think carefully about what you are sending and to who using these services (this goes for all email you send really).

Some of them require cookies (which can always be deleted afterwards, just don't forget), and frames (some allow you to choose no frames), etc. and can't be used through some web-based proxys (like Anonymizer).

YNN Mail
Hushmail -ssl and pgp support
Fastmail - ssl support
Iobox Mail - formerly GNW mail - Finland
Info Space Mail - Anonymizer friendly
Mail City - Anonymizer friendly
Maui Mail - Anonymizer friendly
MyOwnEmail - 200 domain names
Net@ddress - POP3 access
PO Box
Post Master - (England)
Pronto Mail
Start - (Australia)

Free POP & Shell E-Mail Accounts

Using these from your home telephone is NOT secure. Data transmissions are not much different than voice transmissions, which we know are not secure. Many free web based email accounts now offer POP3 access. You could connect from a cyber-cafe, library, etc. or even check your e-mail from a web-based e-mail client below through a proxy web server.

FreeMail POP Only Juno - Free Dialup accounts (Windows & USA only). Netzero offers free dialup for the US and Canada.

Free E-Mail Forwarding

These will forward all incoming e-mail to another e-mail address. You must have another e-mail address (web or other) already. To increase your anonymity you should use a web proxy server to hide your IP address. In order to remain anonymous you must use a web proxy EVERY time you access your web based account. You could also connect from a cyber-cafe, library, etc.

Big Foot
DragonCon
iName
Net Forward


Web-Based E-mail Clients

These are clients that let you check an existing POP E-mail account using only a Web browser. Check your E-mail anytime, anywhere, with no need to sign up for a web based e-mail account. Useful for those who connect to the Net through a firewall from work school, etc. Web based e-mail that also has POP3 access can be checked through these (most can not).

Mail and News also with SSL
Pop 3 Now also with SSL
Mail Reader also with SSL
also available in Swedish and Norweigan
Mail Start
Also available in Portugese, French and Spanish.
UNO Mail
You can consolidate up to 20 different POP3 accounts through this web-based reader. You can also set up a personal address book.
Panda Mail

Stenography allows you to hide files including e-mail inside of images, sounds and more.

Further Reading and Resources

G.E.Boyd's Everything by Email Web Page

Free email and related services directory

Report this post as:
Share on: Twitter, Facebook, Google+

add your comments


also good

by pr Tuesday, Sep. 23, 2003 at 10:23 AM

Participating With Safety:
A series of briefings on information security and online safety for civil society organisations


An Introduction to the 'Participating With Safety' Project
Computers are a very useful tool to assist people's work. They not only help with writing, graphic design and publishing information, they are increasingly becoming an essential communications tool as part of computer networks and the Internet.

But the reliance people have on computers is also a weakness. This weakness, and the ways of working around the problems computer technology can create, must be understood by those using computers. Through the understanding of the weaknesses of the way computers and computerised communications work we can take steps to protect our work, our security and our privacy.

There are many different aspects to using computers securely:
You can set-up the computer to run more securely and reliably;


Using access controls, such as passwords, you can prevent disclosure of information;


By organising the information on the computer, and keeping regular copies, you can prevent the loss or corruption of information; and


Using various means, you can secure your use of the Internet, and prove the authenticity of your communications.


Using computers more securely is a mixture of learning a little more about how the computer works, and undertaking certain tasks on a regular basis. The vast majority of the risks to your use of your computer come from mistakes in your own use or storage of information, or from the failure of the equipment it is stored on. Surveys in industries dependent on computer technology have found that 75% of data losses are due to internal errors, not from external factors such as computer viruses or deliberate damage. You don't have to organise your information according to a strict formula. But it must be done in a way that everyone who needs to use it understands how data is stored and used. It's also important to organise things to make it easier to keep copies of information, and to store those copies in such as way that they cannot be damaged or destroyed.

The other issue to deal with are the external threats to your work and computerised information. This comes from a variety of sources. There are the everyday risks from bad software and computer viruses. But increasingly we are becoming subject to directed risks; this can be the intrusion by the state or corporations who seek to frustrate or prevent our work taking place, or those seeking to defraud or steal information or computer equipment. The careful management of information, and the use of access controls to data and equipment, can help reduce the impacts of any attacks on you or your organisation. But it is important to realise that you can never completely prevent damage or data loss from external influences.

Overall, the purpose of these briefings is to help you make a qualitative improvement to the security of your computer and communications.



Report this post as:
Share on: Twitter, Facebook, Google+

add your comments


© 2000-2018 Los Angeles Independent Media Center. Unless otherwise stated by the author, all content is free for non-commercial reuse, reprint, and rebroadcast, on the net and elsewhere. Opinions are those of the contributors and are not necessarily endorsed by the Los Angeles Independent Media Center. Running sf-active v0.9.4 Disclaimer | Privacy