Silk Road forums

Discussion => Security => Topic started by: PowerToCharm on August 04, 2013, 04:46 pm

Title: Is Hushmail still free?
Post by: PowerToCharm on August 04, 2013, 04:46 pm
I had a free Hushmail account that expired because I didn't log in for thirty days, but when I try to create a new account the signup page only has options for creating premium or business accounts which both cost money. Is there no more free Hushmail? Or am I just not on the right signup page? Grateful for any advice.
Title: Re: Is Hushmail still free?
Post by: envioso on August 04, 2013, 06:41 pm
are you trying to get arrested?
Title: Re: Is Hushmail still free?
Post by: PowerToCharm on August 04, 2013, 08:02 pm
are you trying to get arrested?

Obviously not. Are you suggesting that using Hushmail will get me arrested? Information please.
Title: Re: Is Hushmail still free?
Post by: Quazee on August 04, 2013, 08:10 pm
are you trying to get arrested?

Obviously not. Are you suggesting that using Hushmail will get me arrested? Information please.
Hushmail is leaking info to fed/hushmail is owned by the feds. do a little google search on hushmail.
Title: Re: Is Hushmail still free?
Post by: flashlight5 on August 04, 2013, 08:15 pm
i think the freemail option is still available. if you use tor or some sh*t its not.

for some tasks i still use it. there down sites to every service.

but this three week thing is really annoying

Title: Re: Is Hushmail still free?
Post by: comsec on August 04, 2013, 08:25 pm
Hushmail is probably the most dangerous email you can use. PGP encrypted Gmail would be safer.
If you need an email address:

- buy a cheap,anonymous domain with bitcoins that comes with email and only ever use Tor to signup or to access the mail (PGP encrypted)
- buy a cheap VPS and make your own .onion email server using qmail or openSMPTD
- use privatdemail.net
- look into I2P-Bote  which is sort of like bitmessages
- use bitmessages
- use a nym server/mixmaster
- use strongbox http://www.newyorker.com/strongbox/
- use global leaks software dead/drops https://globaleaks.org/


If you end up using a non .onion or non i2p email service, then make sure you enable TLS in whatever you use to fetch them over Tor so an exit node can't MITM attack your emails, which should be PGP encrypted anyways
Title: Re: Is Hushmail still free?
Post by: PowerToCharm on August 05, 2013, 12:45 am
Comsec, thank you very much indeed.
Title: Re: Is Hushmail still free?
Post by: Nightcrawler on August 05, 2013, 12:48 am
Why Hushmail is Especially Dangerous

Hushmail is the poster-boy for cooperating with the Feds, especially the DEA. If you read their terms of service, you would soon find out that Hush has a ZERO TOLERANCE for criminal activity -- they actively cooperate with the police, even in the absence of a warrant. If the DEA wants to get a warrant, it's easy for them to do so -- they use the Mutual Law Enforcement Assistance Treaty (MLAT) between the U.S. and Canada.

The DEA goes to the U.S. government, who approaches the Canadian government, and the Minister of Justice issues an order to the B.C. courts to issue a warrant to give the DEA what it wants.

This is what the DEA did in "Operation Raw Deal" (ORD) in 2007, when they targeted American steroid dealers and their Chinese bulk powdered steroid suppliers.

Hushmail provided 12 CDs worth of DECRYPTED email to the DEA as part of Operation Raw Deal. Even as late as last year, people are still being arrested as a result of ORD. A DEA spokesman boasted to the media about receiving more than 100,000 DECRYPTED email messages from Hushmail.

It has also been reported (and I believe this to be true) that Hushmail scans email headers (like Subject: lines) for keywords -- any keywords matching those on a list, are flagged, and the accounts/emails are examined.

If Hushmail finds that an account is being used for illegal activity, they lock the account, and turn over the account info to the RCMP/Interpol.

See: Encrypted E-Mail Company Hushmail Spills to Feds
     By Ryan Singel November 7, 2007 3:39 pm
     http://www.wired.com/threatlevel/2007/11/encrypted-e-mai/
     
Read the original affidavit linked-t in the article -- you'll find it a real eye-opener.     


Nightcrawler
4096R/BBF7433B 2012-09-22 Nightcrawler <Nightcrawler@SR>
PGP Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB8F1D88EBBF7433B      (MIT clearnet keyserver)
PGP Key: https://keys.indymedia.org/pks/lookup?op=get&search=0xB8F1D88EBBF7433B    (IndyMedia https: clearnet keyserver)
PGP Key: http://qtt2yl5jocgrk7nu.onion/pks/lookup?op=get&search=0xB8F1D88EBBF7433B (IndyMedia .onion keyserver)
PGP Key: http://dkn255hz262ypmii.onion/index.php?topic=174.msg633090#msg633090     (Silk Road Forums PGP Key Link)
PGP Key Fingerprint = 83F8 CAF8 7B73 C3C7 8D07  B66B AFC8 CE71 D9AF D2F0