Any confirmation that hush mail has been compromised by LE?
Does this include elitefitness.com?
Does this include elitefitness.com?
jon79 said:no
digger posted something on this earlier in the week
he basically said hush is still ef choice of email provider....so it seems that he had no worries..thelion2005 said:TY k ... I'm way behind.
jon79 said:he basically said hush is still ef choice of email provider....so it seems that he had no worries..
oh thanks for that lolTweakle said:If you were to use it for illegal transactions it's most certainly not safe.
But for mailing mom to see how she's doing should be just fine.
kano said:the whole internet is comprised.. you wann prove it to yourself. go to google type this in the search bar .. i am going to assisiante the p o t u s o a... aka geroge bush.. and see how long it is begore you get a vistit from the police or feds you think i am nuts go ahead and try it and watch what happens lol
lmao at peoples delusionskano said:the whole internet is comprised.. you wann prove it to yourself. go to google type this in the search bar .. i am going to assisiante the p o t u s o a... aka geroge bush.. and see how long it is begore you get a vistit from the police or feds you think i am nuts go ahead and try it and watch what happens lol
ceo said:hush handed over emails in at least one lab bust. gave em right to dea on a CD. DEA even had all the info in the bodies of those emails...$ paid, how paid (WU or greendot), names and addresses sent to, etc. Proof is in the link below.
http://static.bakersfield.com/smedia...filiate.25.pdf
The government clearly has access to hush email through what is apparently known as "MLAT" Mutual Legal Assistance Treaty.
Moltke said:lmao at peoples delusions
do you realize how vast and impossible to manage the internet is?
virtually impossible to effectively police, you joosers made it a hell of a lot easier by pointing the feds in the right direction. no one to blame but yourselfs
i don't doubt this at all, good post.jh1 said:I doubt you'd get a visit for searching Kano's term, but I am not sure what you are refering to as a dillusion.
Although the internet is vast and an unimaginable amount of data flows over it - basic traffic has, can and will be tapped and monitored - most prominently by a system called eschelon (Intelligence) & a system called carnivore (Law Enforcement). When all the terrorist scare tactics were in full effect the NSA was able to get AT&T and other providers to put taps on vast fiber backbones of the internet and pump the tapped data into huge rooms filled with NSA equipment. It's suspected every major player was involved, but at AT&T there was a whistle blower, a lawsuit by the EFF, etc - all which has been effectively swept under the rug.
Moltke said:i don't doubt this at all, good post.
i find it funny that people think using hushmail is 100% safe, same with those stupid disclaimers lol
Angel said:lol. oh my......You have over 600000000 million kids in a room, can you watch all of them and hear all of their convos at the same time???
hstern said:looking for keywords in a sequence probably pretty easy to do
""We are providing the encryption, and anything people send is between them," said Gilliam, who is also president of Austin technical recruiting firm the Adderley Group. "We'll have to deal with that issue when we come to it. We do have logs of messages, but we are not able to read them. [A law enforcement subpoena] would be a hairy issue, and we have not considered it yet."
Is it legal?
Encryption lawyers suggest that HushMail would be on solid legal ground in the face of a subpoena.
"If they really don't have the data, they can't give up what they don't got," said Michael Froomkin, law professor at the University of Miami. "That's a pretty good defense."
"What if my message is subpoenaed? Hush, like any company or individual, is legally bound to respond to court-issued subpoenas. However, because not even HushMail can access the encryption keys of individual users, in the case of a subpoena HushMail would only be able to provide the encrypted (coded) version of the transmitted email."
Hush Communications USA, for example, is based in Texas with its server located in Vancouver, Canada. It offers a web-based e-mail system called Hushmail which is used in the same way as Yahoo!Mail and MSN HotMail. The Hushmail system uses a mini-program which is downloaded to a user’s computer and performs encryption on the fly. This process is then reversed at the other end when the message is decrypted on the computer to which the message is being sent. Jon Gilliam at Hushmail, notes that the levels of encryption that Hushmail can offer are such that "it would take 40 servers 40 years to crack the encryption on one single word". Gilliam says that all Hushmail communications are stored on their servers and not by the user’s particular Internet service provider. He also stated that third party access to messages sent by Hushmail is not a great concern due to the incredible levels of security provided by the encryption technology.
In regard to investigations of encrypted communications, Gilliam says that Hushmail would of course comply with requests from authorities for users’ transmissions if required to do so, but those transmissions would be totally encrypted, and completely unreadable by the courts. "Because only the sender and the recipient of the data transmissions hold the key to the encryption, which is itself encrypted, the data provided to the courts would be useless information," he says. Given the current uncertainty regarding the ability of authorities to access keys to encrypted information, Hushmail offers a product well-suited to individuals doing business with offshore financial service providers.
triceptor said:I'm under the impression that one way to send an email that can't be "sniffed" by systems like echelon is to convert your message to an image file like a TIF or JPG and send as an attachment.
jh1 said:This whole Hushmail thing has peaked my interest...
This is from 1999, an article about hushmail where the whole premise what that they didn't have access to the passphrase therefore couldn't unencrypt messages:
http://www.news.com/Firm-unveils-encrypted-free-email/2100-1023_3-226160.html
And I believe that to be true, especially back in 2003, when the encryption decryption engine was a local java applet that never sent your passphrase to their servers. Now you login directly via HTTP/S so you are sending your phrase over the wire - they could and apparently do store this.
This page contains mature content. By continuing, you confirm you are over 18 and agree to our TOS and User Agreement.
Please Scroll Down to See Forums Below 










