Question:
How would 2 horribly paranoid people email each other securely?
Uncle Pennybags
2012-11-29 16:29:52 UTC
Assuming they want not only their messages not read by others, but not even known they are emailing each other.

I'm figuring:
1. each has a non-specific public email accounts like ABC123@hotmail.com.
2. Each encrypts the text to be emailed with PGP or some other encryption software.
3. To send, they use different proxy sites each time, using https protocol, then going to an anonymous remailer site they vary each time, then email the encrypted text to that public account.
4. To receive, they use different proxy sites each time, checking that email account and picking up the encrypted message, and then decrypting it on their system.
5. Of course, all this is used while in private browsing mode on the computer they are using. And assumes they run strong security software on their system including searching for key loggers.

Is there anything else they can do to increase security even more?
Ten answers:
2012-11-29 17:19:41 UTC
Use this and read their FAQ http://www.unspyable.com
2016-12-13 16:43:37 UTC
unsolicited mail Fritters. i understand they style undesirable, yet a minimum of the unsolicited mail has been battered. in line with hazard they could have a campaign to get spammers to apply photograph voltaic capability. I do think of that technologies to chop back the capability intake of desktops is a step forward. a lot of desktops use the comparable capability whilst they are idle as they do whilst they are easily doing some thing. i don't know what the electrical powered energy bill for a great server could be like, yet i'm guessing that it fairly is extensive.
2012-11-29 18:34:48 UTC
Using a Linux "Live" CD for both parties:

Create a Yahoo account with an absolute bullet proof Username & Password.

Share that between both parties via some "out-of-band" method (landline telephone or snail mail for instance).

Within the Yahoo Notebook service, draft your text bodies using local encryption software (like TrueCrypt, and also have bulletproof passcodes pre-shared) as text files, and upload/save in pre-determined folders on Yahoo.

Each party can then log-in from anywhere (using MAC spoofing) and access the folders (using "ToR") > download the encrypted 'block'> locally decrypt.



Live CD has no changes made to it after de-mounting, so history/cookies/cache etc. would not be an issue.

ToR (The Onion Router) provides encryption & anonymity for trans-Internet jumps.

Bullet proof passwords should follow hyper-sensitive protocols and be written down; never saved in digital form.

Use non-traceable 'hot-spots' for all 'Net access, never repeated.
balloon buster
2012-11-29 18:57:32 UTC
Either destroy the computer and replace it on a regular basis or booby trap it so any attempt to hack it or move it improperly destroys it. If you're feeling like an irritable mad bomber, arrange it so it destroys whoever is messing with it.

Thanks for the other ideas. Nothing is perfect but some things can get close.



BTW, this is something I was considering after the Columbine mess. Many of these lone killers at some point try to reach out and get rebuffed. It is not actually possible for them to see a shrink etc in the USA since shrinks are legally bound to report them and have them restrained if they mention such violent tendencies and want to talk about them. The Catholic confessional has a long tradition of keeping its secrets, but there have been violations even of that. And, its dated, doesn't meet modern needs or help non catholics. I was trying to think of a way to create a psychiatric hotline, on line, specifically for those souls who are in that position. Their paranoia prevents them from going to the regular sources for help and would prevent them from using any service that could be hacked or subpoenaed. Yet, if even only 1 in 100 could be helped this way, that's one less massacre we might have to read about.

Feel free to take the idea and run with it. It would be a good thing,although, by its security, it would attract criminals, revolutionaries and terrorist radicals. Every solution to one problem creates new ones.
2012-11-29 16:32:22 UTC
Well frankly if somebody is really determined to break into your email or your computer or your secret porn stash in the basement, they can find a way to do it. As far as computers go, there really is no perfect security.



There is pretty good privacy. That's it's name. It's a public domain open key encryption system. Unless the damn mossad is after you or something it will pretty much protect your secret emails to underage girls, or whatever it is you're up to



Oh right you're already using that. Yeah that's about it. Beyond that I'd say, grow the hell up and stop worrying about stupid crap.
2012-11-29 16:35:46 UTC
first, not many are going to know how to decrypt the message anyway, thats a great start. but may i suggest using a less popular public email account. Hotmail, AIM, Yahoo, etc. And if they were that paranoid about keyloggers and viruses they could try getting seperate computers to send and recieve the encrypted message.
adaviel
2012-11-29 16:48:05 UTC
You regularly upload webcam pictures of birds in your back yard to a photoserver.

Your correspondant randomly but regularly downloads the photos, no more than any other random bird fancier.

On every image, you use steganography to include an encrypted text of the current weather.

When you want to send a secret text, you substitute it for the weather text.
who WAS #1?
2012-11-29 18:32:51 UTC
Adaviel has the best way. However, if someone finds the software in your computer, they can figure out that you are doing it. Doesn't much help though if someone is logging your keystrokes. But that is essentially a virus and that (far as I know) can be detected with something like "spybot search and destroy", which is free. But I am no expert on that part. The picture thing is foolproof, other than that.
Mike S
2012-11-29 16:34:45 UTC
That's kinda an overkill but to make it more secure just send it with a password to be opened by the receiver only.........
mildred f
2012-11-29 17:45:28 UTC
Meet in person and talk. Then no one else will know what this is about. Security is not an issue this way.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...