Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
theo said:What is the best encrypted place I can use to send mail from? I heard the Feds had taken over elite, any truth
oldtimer said:Dude forget free "encrypted" emails, it's nothing but a big lie. If you don't encrypt end-to-end, then someone's watching what you send. For example, when you use ziplip/hushmail etc., your clear-text email hits their servers, so they can actually log what you send.
If you want secure emailing, use PGP or S/MIME (i prefer the latter).
-OT
oldtimer said:Dude forget free "encrypted" emails, it's nothing but a big lie. If you don't encrypt end-to-end, then someone's watching what you send. For example, when you use ziplip/hushmail etc., your clear-text email hits their servers, so they can actually log what you send.
If you want secure emailing, use PGP or S/MIME (i prefer the latter).
-OT
theo said:What is the best encrypted place I can use to send mail from? I heard the Feds had taken over elite, any truth
mrmoo said:Hushmail is secure, end to end. Or at least no one has proved that it isn't.
mrmoo said:I suggest you go look up how hushmail really works. Not how you think it works. Java code is downloaded which encrypts the plaintext before it is sent anywhere. Hushmail is secure, end to end. Or at least no one has proved that it isn't.
Your kidding right? I don't even know where to start. Nonrepudiation is the ability to guarantee a message was sent from someone. This is accomplished with digital signatures. Both PGP and Hushmail have the ability to do this. Encrypting from your machine to thier servers does nothing to stop nonrepudiation. If you get a digitally signed message from a hushmail user you can mathmatically be guaranteed that it was sent from the claimed hushmail account.oldtimer said:I don't need to look their specs up, if you're encrypting from your machine to their servers, then you've wasted a big part of what crypto is all about (it's call non-repudiation), and yes, they can log your emails.
There IS a passphrase in PGP. It's used to symetrically decrypt the private key. This prevents someone from accessing your computer and using your private key to send emails. Have you ever used PGP of GPG?In PGP and S/MIME, there's no passphrase between you and any server, it's based on public key cryptography.
No they're not. The code is published. Go read it and find out how wrong you are.If hushmail told you they use passphrases, and that they don't know the passphrase, then they're lying to you.
They store a one way hash. It's mathmatically improbable (depending on many factors including passphrase length) to derive the original passphrase from the hash.Tell me, if there was a passphrase that needs to be validated, how can that be done by the validator without knowing the passphrase?.. this is the basic problem of shared secrets (in security terms).
Then he should probably write a paper about it. I'm very aware of the latest security vulnerabilities. I have been since before Hushmail was introduced. I can't EVER remember seeing any vulnerabilities in the implementation of hushmail. A quick google search also returns nothing. Thier code is open. Many people depend on the security of hushmail. If you or Phil knows a flaw, there are thousands of security researchers around the world who would be very interested in knowing.BTW, i met Phil Zimmermann once (inventor of PGP), and he had some interesting things to say about these so call crypto technologies..
Your correct. Both me and OT agree on this. The argument now is whether hushmail itself is secure.Bob Smith said:End to end meaning hushmail to hushmail, or hushmail to say, keptprivate? OT can explain further, as this lies in his field, but from my limited knowledge, as long as the email stays on a particular server (KP, Ziplip, etc), then youre fine. But once you send outside your server, without using some additional encryption methods, then its like sending a yahoo email.
OT, feel free to correct me if Im totally wrong.
mrmoo said:Your correct. Both me and OT agree on this. The argument now is whether hushmail itself is secure.
Admitedly I was a little hasty with my "end to end" comment. It was a bad choice of wording on my part. Not many people on here know about security and sometimes it's difficult to get your point across without getting too technical. When I said end to end, I mistakenly made the assumption that we were talking a hushmail to hushmail server. Understanding that an email sent from hushmail to yahoo won't be encrypted I regrettably took as a given.
I have a lot of respect for both you and OT. I've learned a lot from both of you. But, in this case, OT is completely wrong. He's giving bad advice based on his misunderstandings. Whether he's in "the field" or not.
