Quote from: zazoo on September 12, 2012, 02:07 amThis email would just be a way of communicating with him so hotmail, tormail. As long as it has been set up incognito shouldn't matter should it?Interested in your talk of intersection techniques. How many people do you think have searched 'quadrotors' today? Or visited http://www.lionsgatepublicity.com/epk/kickass/images/09_72dpi.jpgThanks for the advice, hope people remember to use Tor when visiting clearnet links. Then again, when already on Tor, why switch to clearnet just because the link is clearnet.Yes, as long as the email is setup anonymously in the first place it shouldn't matter. The main issues are practical, that many webmail sites force you to use JavaScript to sign up and not to have your clearnet browser open logged into the same provider of webmail, and also have the same thing on the TBB with a different a/c. It's not that they share cookies or something, it's that if your computer goes down, they can correlate with a timing attack that the two people are the same person. If those aren't a problem, then it's unlikely to be a problem.The problem with using a webmail that you also use in RL, is also psychological, that you may accidentally login on the wrong browser without even realizing it. It's not as if the TBB and Firefox seem very different, and many people login to their webmail multiple times a day (I hear crazy things, like office workers logging in an average of 20 times a day, but not sure this is true) out of sheer habit. Something like this is what got Sabu, he accientally logged in once through a non-Torified IRC and then they got him. Actually, I think it's more likely they used an illegal exploit embedded in his fucking Macintosh software that everybody else also has because the people who run Apple are complete cunts, and then covered this up by waiting for him to make a mistake and then pouncing, because it seems a bit too twee and perfect and I know operations are much more hairy than that -- the best of conspiracy pine theoryAs for 'quadrotors' etc they may have done, but I certainly wasn't one of them. Visiting a youtube video immediately after it is recommended is dumb, but visiting it after a day or so is fine, something like 10k+ people per day would have watched such a video by then. Also you can download youtube videos over Tor and watch them in a VM anyway (tutorial in sig...). With that URL (red mist), I never actually visited it on clearnet either. In fact, if I remember correctly I didn't so much as visit it with Tor, an image search engine proxy did that on my behalf and I just chose the correct URL. In any case, the very best thing anybody has logged about anything visiting those URLs on Tor is the IP address of a couple of exit nodes, which is completely worthless. When youtube and everybody else upgrades to HTML5 completely, all this stuff becomes less of an issue when the dreaded flash won't be used anymore.Maybe you're right and I should be mentioning these things more often, in case people think it's ok or something to visit these things on clearnet. I can't assume everybody hasn't thought of this stuff though, or it'll sound like I'm lecturing everybody on A B C all the time, which will get annoying quickly. Maybe a -- Don't Go To This On Clearnet -- tag convention will be enough.The key thing to avoid is those threads about post your favorite youtube music videos and make a playlist kind of threads. Then you have people from SR hypothetically hopping from specific music video to specific music video within a very short space of time, in which case a intersection attack would be highly effective if somebody bothered to do it. This sounds more complicated than it actually is. If you're a LEO, you just say to Google: I want the IP addresses of everybody, give or take x %, who was at this URL and this URL and this URL... between the hours of X and Y GMT. In other words, an intersection attack does not have to be a technically skilled adversary.The other thing is those "post your favorite book/movie" threads. While I don't think the OP is malicious, requests could be made to Amazon to check if there's any customers who bought X Y Z books.The main message of this post, is to understand the fundamental principal of counting because that is the probabilistic basis of intersection attacks. Being aware is the key to defeating such detective work. The other thing is placing thousands of tiny red herrings nobody would even imagine are lies because they don't sound like anything somebody would lie about.Together, defensive (using Tor for everything) and offensive (lying all the time), both techniques cover your ass.