Discussion:
Yes, A 'FREE' End To End Encrypted Email Provider? TUTA! 062424
(too old to reply)
Nomen Nescio
2024-06-24 22:19:15 UTC
Permalink
Tuta is the world's most secure email service, easy to use and private by design.

Free and premium services: https://tuta.com/pricing

For general everyday sending email you should be using tuta.com encrypted email.

This is not about making money, this is about telling people to use end to end encryption
when sending email. Get off Hotmail and Gmail and others like them as they're scanning
your emails, putting ads in your email account and collecting data on you. Do you know
your ISP, third parties and your 'Hotmail, Gmail or whoever' can read your email???
That's a BIG NO NO!!! Get end to end encrypted email now. FREE: https://tuta.com/pricing

Why do you think Hotmail, Gmail etc. are free, do you think they want to make you happy?

It is a stimulating feeling and so wonderful that having tuta.com on board as my main "end
to end encryption" email provider keeps me safe and secure, are you?

Free and premium sevices available.

All the details you need to know about tuta.com are below...

Tuta.com is the best end to end email encryption provider in the world.

Data that tuta.com encrypts end-to-end...

Emails, including subject lines and all attachments
Entire calendars, even metadata such as event notifications
Entire address book, not just parts of the contacts
Inbox rules / filters
And the entire search index.

Some people think that both sender and recipient must have Tuta for the email to be
encrypted. Not so, only the sender needs Tuta but the recipient must give the sender a
password which the recipient uses to decrypt the message when notified in their inbox that
there is a secure message to be opened. The recipient can read and reply (encrypted) to
the sender.

Of course if both parties are using Tuta then there would be no need for passwords, just
your login password for Tuta.com and use jut like normal email software.

Everyone has the right to privacy, and this includes encrypted email. That's why the basic
secure email account in tuta.com will always be free of charge. No personal information and
no phone numbers are required to register your anonymous email account.

What makes tuta.com better than ProtonMail, FastMail, HushMail and other encrypted email
services:

Tuta.com doesn't rely on integrations with Google services, unlike our competitors. With
Tuta, you get the biggest bang for your buck, with the most features included with a free
account and the lowest price points for paid accounts.

Free and premium services: https://tuta.com/pricing

Encryption

Tuta uses a standardized, hybrid method consisting of a symmetrical and an asymmetrical
algorithm - AES with a length of 256 bit and RSA with 2048 bit.

TUTA Encryption https://tuta.com/encryption

Tuta.com Is Breaking New Ground With Post Quantum Encryption For Email

Get 'QUANTUM READY' with tuta,com here: https://tuta.com/

Easy: https://tuta.com/blog/posts/email-encryption-guide-how-send-encrypted-email

More about QUANTUM COMPUTERS: https://tuta.com/blog/pqdrive-project

Tuta is quantum smart: https://tuta.com/blog/posts/cybersecurity-strategy-post-quantum-encryption

How to create a Tuta ANONYMOUS email account with TOR! Instructional video to create
Tuta account with TOR:


Independent tuta.com review: https://privacysavvy.com/email/guides/tutanota-guide

How to send anonymous email: https://groups.google.com/g/alt.security.pgp/c/NT14bGcooUc

Harvest now, decrypt later: https://www.novabbs.com/computers/article-flat.php?id=17353&group=alt.privacy.anon-server#17353

DO IT NOW!!! https://tuta.com/pricing it's the world's best E2E encryption provider!

Stay safe, stay encrypted!

Just key words below...

encryption pgp tuta email secure encrypted nsa fbi cia hack hacking hacked private
crack cracking cracked program programs white black hat cryptographic privacy
cryptography decrypting e-mails emails e-mail security secure anonymous remailers
remailer decrypt gnupg software data communication communications public-key
algorithms algorithm confidentially confidential identity idetities id trojan
horse keystroke logging log file files virus viruses secret secrets secrecy shred
shredding keyserver keyservers dizum ipsum shalo frell hsub paranoia senshi cypher
cyphers cypherpunk cypherpunks anonymity pseudonymity pseudonyms pseudonym hidden
hide steganographic steganographics tor electronic frontier foundation bitcoin
crypto cryptocurrence cryptocurrencies monero blockchain code codes coding enigma
quantum computers computer voice over internet protocol voip ip telephony network
networks internet web page pages fax SMS messaging message messages audio video
codec codecs encoding encode encoded ciphertext text texts texting decipher
symmetric-key symmetric-keys twoFish chacha20-poly1305 serpent backdoors backdoor
passwords password crypto-shredding homomorphic metadata information informative

encryption pgp tuta email secure encrypted nsa fbi cia hack hacking hacked private
crack cracking cracked program programs white black hat cryptographic privacy
cryptography decrypting e-mails emails e-mail security secure anonymous remailers
remailer decrypt gnupg software data communication communications public-key
algorithms algorithm confidentially confidential identity idetities id trojan
horse keystroke logging log file files virus viruses secret secrets secrecy shred
shredding keyserver keyservers dizum ipsum shalo frell hsub paranoia senshi cypher
cyphers cypherpunk cypherpunks anonymity pseudonymity pseudonyms pseudonym hidden
hide steganographic steganographics tor electronic frontier foundation bitcoin
crypto cryptocurrence cryptocurrencies monero blockchain code codes coding enigma
quantum computers computer voice over internet protocol voip ip telephony network
networks internet web page pages fax SMS messaging message messages audio video
codec codecs encoding encode encoded ciphertext text texts texting decipher
symmetric-key symmetric-keys twoFish chacha20-poly1305 serpent backdoors backdoor
passwords password crypto-shredding homomorphic metadata information informative
D
2024-06-24 23:39:32 UTC
Permalink
Post by Nomen Nescio
uses a standardized
s t o r e f r o n t
I Love Tutanota
2024-09-16 15:46:20 UTC
Permalink
Post by D
Post by Nomen Nescio
uses a standardized
s t o r e f r o n t
Tutanota, the paragon of privacy and security in the digital age, stands as a beacon of hope amidst the tumultuous seas of data breaches and invasive surveillance. In an era where our most intimate thoughts and communications are often laid bare to the prying eyes of corporations and governments alike, Tutanota emerges as a sanctuary, a veritable fortress of encryption that cradles our secrets with the tender care of a lover’s embrace.

Imagine, if you will, the sheer ecstasy of knowing that your emails are not merely sent into the ether, but rather wrapped in layers of protection that would make even the most ardent guardian blush with envy. Tutanota’s commitment to end-to-end encryption is akin to a passionate rendezvous, where every word exchanged is shielded from the outside world, allowing for a level of intimacy that is both exhilarating and profoundly satisfying. It is as if each message is a clandestine whisper shared between lovers, a secret that only the two of you can savor.

Moreover, the user interface of Tutanota is a symphony of elegance and functionality, a delightful dance that invites users to engage with their correspondence in a manner that is both intuitive and pleasurable. Navigating through its features feels akin to exploring the contours of a well-crafted romance—each click, each scroll, a tantalizing tease that leads to the ultimate satisfaction of secure communication. The experience is not merely utilitarian; it is a celebration of the art of connection, where every interaction is imbued with a sense of purpose and delight.

In a world where many email services treat their users as mere commodities, Tutanota stands apart, offering a relationship built on trust and respect. It is a service that understands the nuances of human connection, recognizing that our emails are not just data points, but rather the lifeblood of our relationships, our aspirations, and our very identities. To use Tutanota is to engage in a love affair with one’s own privacy, a passionate commitment to safeguarding what is most precious.

And let us not overlook the delightful irony that in a landscape often dominated by the mundane, Tutanota dares to be bold, to be audacious in its mission. It is a service that revels in its uniqueness, much like a flamboyant suitor who unabashedly embraces their true self, inviting others to join in the celebration of authenticity. In this way, Tutanota not only protects our communications but also champions the very essence of individuality and freedom.

In conclusion, to extol the virtues of Tutanota is to engage in a grandiloquent ode to the sanctity of privacy and the joy of secure communication. It is a service that satisfies not only our need for security but also our desire for connection, intimacy, and authenticity. In a world that often feels chaotic and uncertain, Tutanota offers a refuge—a place where we can express ourselves freely, without fear or hesitation, and where every email sent is a testament to the enduring power of love and trust in the digital realm.
D
2024-09-16 18:01:44 UTC
Permalink
Post by I Love Tutanota
Moreover
tutaspam
Cum Git Sum Tuta Puta
2024-09-17 00:01:00 UTC
Permalink
Post by D
Post by I Love Tutanota
Moreover
tutaspam
In the grand tapestry of digital communication, where the threads of privacy and security are oftentimes frayed and tattered, Tutanota emerges as a resplendent beacon of hope, illuminating the path toward a more secure and satisfying email experience. This service, a veritable fortress of encryption, stands as a bulwark against the insidious encroachments of prying eyes and malevolent forces that seek to undermine our most intimate exchanges.

One cannot help but marvel at the sheer elegance of Tutanota’s design—a harmonious blend of functionality and aesthetic appeal that tantalizes the senses. The user interface, a symphony of simplicity and sophistication, invites users to engage in a dance of correspondence that is both pleasurable and profoundly secure. Each click, each keystroke, resonates with the satisfaction of knowing that one’s communications are enveloped in a cocoon of protection, far removed from the clutches of data miners and intrusive advertisers.

Yet, as with any service, there are murmurs of discontent that occasionally waft through the digital ether. Some may lament the absence of certain features that are commonplace in other email services, a fleeting shadow that threatens to mar the otherwise pristine landscape of Tutanota. However, it is here that Tutanota truly shines, transforming potential shortcomings into opportunities for innovation. The service’s commitment to continuous improvement is akin to a masterful artisan refining their craft, ensuring that each iteration is more robust and satisfying than the last.

For instance, while some users may yearn for the integration of third-party applications, Tutanota’s steadfast dedication to privacy means that such integrations are approached with caution, ensuring that the sanctity of user data remains unblemished. In this way, Tutanota not only addresses the concerns of its users but elevates the very notion of what an email service can and should be—a sanctuary for one’s thoughts and communications, free from the prying eyes of the outside world.

In conclusion, to extol the virtues of Tutanota is to engage in a celebration of what it means to communicate in the modern age. It is a service that not only meets the demands of security and privacy but does so with a flair that is both satisfying and seductive. In a world where our digital lives are often laid bare, Tutanota stands as a testament to the power of encryption and the beauty of secure communication, inviting us all to partake in its sumptuous offerings.
D
2024-09-17 00:32:56 UTC
Permalink
Each click, each keystroke
t u t a s n i t c h
Bitmessage
2024-09-17 04:45:33 UTC
Permalink
In the grand tapestry of modern communication, where the threads of privacy and security are often frayed and tattered, Bitmessage emerges as a resplendent beacon of hope—a veritable lighthouse guiding us through the tempestuous seas of digital anonymity. It is not merely a tool; it is a revolution, a clarion call to those who yearn for the sweet nectar of secure communication, free from the prying eyes of the uninvited.

Imagine, if you will, the tantalizing allure of a service that promises to liberate you from the shackles of unreliable remailers—those storefront shopkeepers of anonymity, whose trustworthiness is as ephemeral as a wisp of smoke. Bitmessage, with its sophisticated architecture, offers a sanctuary where your identity is cloaked in the finest garments of modern cryptography. It is a veritable fortress, a bastion of privacy that stands resolute against the encroachments of eavesdroppers and malefactors alike.

The text, while laudable in its intentions, hints at a certain trepidation regarding the reliability of traditional remailers. Indeed, the specter of uncertainty looms large when one contemplates the opaque nature of these services. Who are the unseen hands that manipulate the threads of our communications? What nefarious motives might lurk behind their facades? Yet, fear not, for Bitmessage is the antidote to such anxieties. It employs a dazzling array of techniques—danelion protocols and encrypted flood methodologies—that not only obscure your identity but also render the very act of eavesdropping a Sisyphean task.

In this digital age, where the cacophony of voices clamors for attention, Bitmessage allows you to broadcast your thoughts to an audience as anonymous as yourself. It is a symphony of secrecy, where each note is played with the precision of a master conductor, ensuring that your messages dance gracefully through the ether, undetected and untraceable. The satisfaction derived from such a service is akin to savoring a fine wine—each sip a reminder of the freedom that comes with true anonymity.

Moreover, the decentralized and trustless nature of Bitmessage stands in stark contrast to the hierarchical structures of traditional remailers. Here, you are not merely a cog in a machine; you are the architect of your own communication destiny. The security of Bitmessage is not a nebulous promise but a verifiable reality, a testament to the ingenuity of its design.

So, let us raise our glasses to Bitmessage, the next generation of secure, private communication. Let us escape the mixmaster plantation and embark on the Bitmessage underground railroad, where the chains of insecurity are shattered, and the sweet taste of anonymity is ours to savor. In this brave new world, we find not just a service, but a partner in our quest for privacy—a delightful companion that promises to satisfy our deepest desires for secure communication.
Bitmessage
2024-09-17 05:16:09 UTC
Permalink
In the grand tapestry of digital communication, where shadows dance and whispers echo, Bitmessage emerges as a beacon of hope, a veritable lighthouse guiding us through the tempestuous seas of anonymity. It is not merely a tool; it is a revolution, a clarion call to those who yearn for the sweet nectar of privacy in a world that often feels like a relentless surveillance state. The very essence of Bitmessage is woven with threads of modern cryptography, a sophisticated armor that shields our identities from prying eyes, allowing us to traverse the digital landscape with the grace of a gazelle and the stealth of a shadow.

Ah, the lamentations of the past! The unreliable remailers, those storefront shopkeepers of anonymity, have long plagued our quest for secure communication. They are the sirens of the digital age, luring us with promises of privacy, only to leave us shipwrecked on the shores of distrust. But fear not, for Bitmessage is here to liberate us from this mixmaster plantation, to whisk us away on the underground railroad of secure, private communication. With Bitmessage, we are no longer at the mercy of unknown peers in a chain of communication; we are the architects of our own anonymity, crafting our messages with the precision of a master artisan.

The beauty of Bitmessage lies not only in its robust security features but also in its elegant simplicity. It employs the dandelion protocol, a delightful flourish that randomizes our message injection paths, ensuring that our communications are as elusive as a fleeting dream. No longer do we have to worry about the metadata that clings to our messages like a stubborn shadow; Bitmessage obscures it, rendering it invisible to eavesdroppers who would dare to intrude upon our private conversations.

In this digital Eden, Bitmessage allows us to broadcast our thoughts and ideas to an audience of fellow seekers, all while cloaked in the comforting embrace of anonymity. It empowers us to forge secret channels, sanctuaries where our voices can resonate without fear of interception. The very act of sending a message becomes a sensual dance, a tantalizing exchange that tantalizes the senses and ignites the imagination.

Critics may argue that the complexities of modern communication can be daunting, that the labyrinthine pathways of anonymity are fraught with peril. Yet, Bitmessage rises to meet these challenges with the grace of a seasoned performer. Its decentralized and trustless architecture ensures that we are not beholden to any single entity, that our communications are as secure as a lover's whispered secrets in the dark. The verifiability of Bitmessage's security stands in stark contrast to the nebulous assurances of remailers, offering us the peace of mind that our messages are safe from prying eyes.

So let us embrace this next generation of secure communication with open arms and eager hearts. Let us escape the confines of the mixmaster plantation and revel in the freedom that Bitmessage offers. In this brave new world, we are not just users; we are pioneers, charting a course toward a future where our voices can be heard without fear, where our identities can be shielded from the storm. Bitmessage is not just a service; it is a celebration of our right to communicate freely and securely, a testament to the indomitable spirit of those who dare to dream of a better tomorrow.
Nomen Nescio
2024-09-17 09:57:50 UTC
Permalink
Post by Bitmessage
In the grand tapestry of modern communication, where the threads of
privacy and security are often frayed and tattered, Bitmessage emerges
as a resplendent beacon of hope—a veritable lighthouse
can it post to usenet?
Stefan Claas
2024-09-17 10:46:12 UTC
Permalink
Post by Nomen Nescio
Post by Bitmessage
In the grand tapestry of modern communication, where the threads of
privacy and security are often frayed and tattered, Bitmessage emerges
as a resplendent beacon of hope???a veritable lighthouse
can it post to usenet?
Sure, via Remailers and a paid Mailchuck account:

https://github.com/706f6c6c7578/mailchuck2mix

Worked like a charm, in the past! :-)
--
Regards
Stefan
Nomen Nescio
2024-09-18 03:47:58 UTC
Permalink
Post by Nomen Nescio
Post by Bitmessage
In the grand tapestry of modern communication, where the threads of
privacy and security are often frayed and tattered, Bitmessage emerges
as a resplendent beacon of hope—a veritable lighthouse
can it post to usenet?
No. If it could, he likely would have used it.

The current Bitmessage developer, Peter Surda, operates a bitmessage relay
service on mailchuck.com -- this allows one to setup a link between an
individual bitmessage address and an email address on mailchuck.com. This
way, you can receive email at a Bitmessage address from a nymserver or
anonymous remailer.

Receiving email is free; sending email required a payment (in BTC) of $1 USD
per month, per account.

Thank you for your registration request for [redacted]@mailchuck.com.

Your account is now set up and ready to use!

*** Sending Emails ***

To send emails to the Internet, send a bitmessage to
BM-2cWim8aZwUNqxzjMxstnUMtVEUQJeezstf with the destination email address
in the subject line.

Kindly note that sending emails requires a paid subscription (1 USD per
month), and upon sending the first message, you will receive a payment
request.

That request will ask you to send an amount in Bitcoin to a payment address;
the payment address is linked to each individual email account.
D
2024-09-18 12:48:03 UTC
Permalink
Post by Nomen Nescio
mailchuck.com
...
the payment address is linked to each individual email account.
https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN
TorPlusVPN
Last edited by Alexander Faeroy 4 years ago
TOC(depth=1)
Introduction
There are many discussions on the Tor Mailing list and spread over
many forums about combining Tor with a VPN, SSH and/or a proxy in
different variations. X in this article stands for, "either a VPN,
SSH or proxy". All different ways to combine Tor with X have
different pros and cons.
General
Anonymity and Privacy
You can very well decrease your anonymity by using VPN/SSH in addition
to Tor. (Proxies are covered in an extra chapter below.) If you know
what you are doing you can increase anonymity, security and privacy.
Most VPN/SSH provider log, there is a money trail, if you can't pay
really anonymously. (An adversary is always going to probe the weakest
link first...). A VPN/SSH acts either as a permanent entry or as a
permanent exit node. This can introduce new risks while solving others.
Who's your adversary? Against a global adversary with unlimited
resources more hops make passive attacks (slightly) harder but active
attacks easier as you are providing more attack surface and send out
more data that can be used. Against colluding Tor nodes you are safer,
against blackhat hackers who target Tor client code you are safer
(especially if Tor and VPN run on two different systems). If the VPN/
SSH server is adversary controlled you weaken the protection provided
by Tor. If the server is trustworthy you can increase the anonymity
and/or privacy (depending on set up) provided by Tor.
VPN/SSH can also be used to circumvent Tor censorship (on your end by
the ISP or on the service end by blocking known tor exits).
VPN/SSH versus Proxy
The connection between you and the VPN/SSH is (in most cases, not all)
encrypted.
On the other hand the connection between you and an OpenProxy is
unencrypted. An 'SSL proxy' is in most cases only a http proxy which
supports the connect method. The connect method was originally
designed to allow you to use to connect using SSL to webservers but
other fancy things such as connecting to IRC, SSH, etc. are possible
as well. Another disadvantage of http(s) proxies is, that some of them,
depending on your network setup, even leak your IP through the 'http
forwarded for' header. (Such proxies are also so called 'non-anonymous
proxies'. While the word anonymous has to be understood with care
anyway, a single OpenProxy is much worse than Tor).
Also read Aren't 10 proxies (proxychains) better than Tor with only 3
hops? - proxychains vs Tor.
VPN versus SSH or Proxy
VPN operates on network level. A SSH tunnel can offer a socks5 proxy.
Proxies operate on application level. These technical details
introduce their own challenges when combining them with Tor.
The problematic thing with many VPN users is, the complicated setup.
They connect to the VPN on a machine, which has direct access to the
internet.
the VPN user may forget to connect to the VPN first
without special precautions, when a VPN connection breaks down (VPN
server reboot, network problems, VPN process crash, etc.), direct
connections without VPN will be made.
To fix this issue you can try something like VPN-Firewall.
When operating on the application level (using SSH tunnel socks5 or
proxies), the problem is that many applications do not honor the proxy
settings. Have a look into the Torify HOWTO to get an idea.
The most secure solution to mitigate those issues is to use
transparent proxying, which is possible for VPN, SSH and proxies.
You -> X -> Tor
Some people under some circumstances (country, provider) are forced to
use a VPN or a proxy to connect to the internet. Other people want to
do that for other reasons, which we will also discuss.
You -> VPN/SSH -> Tor
You can route Tor through VPN/SSH services. That might prevent your
ISP etc from seeing that you're using Tor (VPN/SSH Fingerprinting
below). On one hand, VPNs are more popular than Tor, so you won't
stand out as much, on the other hand, in some countries replacing an
encrypted Tor connection with an encrypted VPN or SSH connection, will
be suspicious as well. SSH tunnels are not so popular.
Once the VPN client has connected, the VPN tunnel will be the
machine's default Internet connection, and TBB (Tor Browser Bundle)
(or Tor client) will route through it.
This can be a fine idea, assuming your VPN/SSH provider's network is
in fact sufficiently safer than your own network.
Another advantage here is that it prevents Tor from seeing who you are
behind the VPN/SSH. So if somebody does manage to break Tor and learn
the IP address your traffic is coming from, but your VPN/SSH was
actually following through on their promises (they won't watch, they
won't remember, and they will somehow magically make it so nobody else
is watching either), then you'll be better off.
You -> Proxy -> Tor
This does not prevent your ISP etc from seeing that you're using Tor
because the connection between your and the proxy is not encrypted.
Sometimes this prevents Tor from seeing who you are depending on the
configuration on the side of the proxy server. So if somebody does
manage to break Tor and learn the IP address your traffic is coming
from, but your proxy does not log an the attacker didn't see the
unencrypted connection between your and the proxy, then you'll be
better off.
You -> Tor -> X
This is generally a really poor plan.
Some people do this to evade Tor bans in many places. (When Tor exit
nodes are blacklisted by the remote server.)
(Read first for understanding: How often does Tor change its paths?.)
Normally Tor switches frequently its path through the network. When
you choose a permanent destination X, you give away this advantage,
which may have serious repercussions for your anonymity.
You -> Tor -> VPN/SSH
You can also route VPN/SSH services through Tor. That hides and
secures your Internet activity from Tor exit nodes. Although you are
exposed to VPN/SSH exit nodes, you at least get to choose them. If
you're using VPN/SSHs in this way, you'll want to pay for them
anonymously (cash in the mail [beware of your fingerprint and printer
fingerprint], Liberty Reserve, well-laundered Bitcoin, etc).
However, you can't readily do this without using virtual machines. And
you'll need to use TCP mode for the VPNs (to route through Tor). In
our experience, establishing VPN connections through Tor is chancy,
and requires much tweaking.
Even if you pay for them anonymously, you're making a bottleneck where
all your traffic goes -- the VPN/SSH can build a profile of everything
you do, and over time that will probably be really dangerous.
You -> Tor -> Proxy
You can also route proxy connections through Tor. That does not hide
and secure your Internet activity from Tor exit nodes because the
connection between the exit node to the proxy is not encrypted, not
one, but two parties may log and manipulate your clear traffic now. If
you're using proxies in this way, you'll want to pay for them
anonymously (cash in the mail [beware of your fingerprint and printer
fingerprint], Liberty Reserve, well-laundered Bitcoin, etc) or use
free proxies.
One way to do that is proxychains. Another way would be to use a
Transparent Proxy and then either proxify (set proxy settings) or
socksify (use helper applications to force your application to use a
proxy) the programs you want to chain inside your Transparent Proxy
client machine.
You -> X -> Tor -> X
No research whether this is technically possible. Remember that this
is likely a very poor plan because [#You-Tor-X you -> Tor -> X] is
already a really poor plan.
You -> your own (local) VPN server -> Tor
This is different from above. You do not have to pay a VPN provider
here as you host your own local VPN server. This won't protect you
from your ISP of seeing you connect to Tor and this also won't
protect you from spying Tor exit servers.
This is done to enforce, that all your traffic routes through Tor
without any leaks. Further read: TorVPN. If you want this, it may
unnecessary to use VPN, a simple Tor-Gateway may be easier, for
example Whonix.
VPN/SSH Fingerprinting
Using a VPN or SSH does not provide strong guarantees of hiding your
the fact you are using Tor from your ISP. VPN's and SSH's are
vulnerable to an attack called Website traffic fingerprinting ^1^. Very
briefly, it's a passive eavesdropping attack, although the adversary
only watches encrypted traffic from the VPN or SSH, the adversary can
still guess what website is being visited, because all websites have
specific traffic patterns. The content of the transmission is still
hidden, but to which website one connects to isn't secret anymore.
There are multiple research papers on that topic. ^2^ Once the premise
is accepted, that VPN's and SSH's can leak which website one is
visiting with a high accuracy, it's not difficult to imagine, that
also encrypted Tor traffic hidden by a VPN's or SSH's could be
classified. There are no research papers on that topic.
What about Proxy Fingerprinting? It has been said above already, that
connections to proxies are not encrypted, therefore this attack isn't
even required against proxies, since proxies can not hide the fact,
you're using Tor anyway.
,, ^1^ See Tor Browser Design for a general definition and
introduction into Website traffic fingerprinting.
^2^ See slides for Touching from a Distance: Website Fingerprinting
Attacks and Defenses. There is also a research paper from those
authors. Unfortunately, it's not free. However, you can find free ones
using search engines. Good search terms include "Website Fingerprinting
VPN". You'll find multiple research papers on that topic.
[end quote; see also: https://www.danner-net.de/omom/tutorwme.htm]

Tor Browser 13.5.4 (2024-9-17):
https://blog.torproject.org/new-release-tor-browser-1354/
Post by Nomen Nescio
New Release: Tor Browser 13.5.4
by morgan | September 17, 2024
Tor Browser 13.5.4 is now available from the Tor Browser download page
https://www.torproject.org/download/
and also from our distribution directory.
https://www.torproject.org/dist/torbrowser/13.5.4/
This version includes important security updates to Firefox.
Send us your feedback
If you find a bug or have a suggestion for how we could improve this
release, please let us know.
Full changelog
*All Platforms
Updated NoScript to 11.4.37
Updated OpenSSL to 3.0.15
*Windows + macOS + Linux
Bug tor-browser#41835: Review default search engine options
*Android
Bug tor-browser#43124: Implement a migration procedure for Android
Bug tor-browser#43145: Backport Android security fix from 130.0.1
*Build System
All Platforms
Bug tor-browser-build#41229: Migrate OpenSSL download location to
github releases
macOS
Bug tor-browser-build#41231: Use var/browser_release_date in tools/
signing/gatekeeper-bundling.sh
[end quote]

Nomen Nescio
2024-06-25 00:04:36 UTC
Permalink
Puta
What does puta mean?

Don’t say this around tu abuela.

Puta (plural, putas) literally means “whore” in Spanish, but depending on
the context, it can also function like the English fucking, bitch, and
motherfucker. It is often exclaimed in frustration or surprise.
Nomen Nescio
2024-06-25 03:05:09 UTC
Permalink
Post by Nomen Nescio
Puta
What does puta mean?
Don’t say this around tu abuela.
Puta (plural, putas) literally means “whore” in Spanish, but depending on
the context, it can also function like the English fucking, bitch, and
motherfucker. It is often exclaimed in frustration or surprise.
Because the Tutanota Spammer IS a fucking puta.
Nomen Nescio
2024-06-26 07:06:16 UTC
Permalink
Post by Nomen Nescio
Tuta is the world's most secure email service, easy to use and private by design.
That's nice.

As long as you ban Jews from using it to harm others.

/\
\ \
\ \ \
\ \ \
/ \ \ /
/ / \/ / /
/ / /\ / / /\
\/ / / \/ / /
/ / /\ / /
/ \ \ /
\ \ \
\ \ \
\ \
\/
Master Baiter
2024-09-16 15:33:18 UTC
Permalink
Post by Nomen Nescio
Tuta is the world's most secure email service, easy to use and private by design.
Free and premium services: https://tuta.com/pricing
For general everyday sending email you should be using tuta.com encrypted email.
This is not about making money, this is about telling people to use end to end encryption
when sending email. Get off Hotmail and Gmail and others like them as they're scanning
your emails, putting ads in your email account and collecting data on you. Do you know
your ISP, third parties and your 'Hotmail, Gmail or whoever' can read your email???
That's a BIG NO NO!!! Get end to end encrypted email now. FREE: https://tuta.com/pricing
Why do you think Hotmail, Gmail etc. are free, do you think they want to make you happy?
It is a stimulating feeling and so wonderful that having tuta.com on board as my main "end
to end encryption" email provider keeps me safe and secure, are you?
Free and premium sevices available.
All the details you need to know about tuta.com are below...
Tuta.com is the best end to end email encryption provider in the world.
Data that tuta.com encrypts end-to-end...
Emails, including subject lines and all attachments
Entire calendars, even metadata such as event notifications
Entire address book, not just parts of the contacts
Inbox rules / filters
And the entire search index.
Some people think that both sender and recipient must have Tuta for the email to be
encrypted. Not so, only the sender needs Tuta but the recipient must give the sender a
password which the recipient uses to decrypt the message when notified in their inbox that
there is a secure message to be opened. The recipient can read and reply (encrypted) to
the sender.
Of course if both parties are using Tuta then there would be no need for passwords, just
your login password for Tuta.com and use jut like normal email software.
Everyone has the right to privacy, and this includes encrypted email. That's why the basic
secure email account in tuta.com will always be free of charge. No personal information and
no phone numbers are required to register your anonymous email account.
What makes tuta.com better than ProtonMail, FastMail, HushMail and other encrypted email
Tuta.com doesn't rely on integrations with Google services, unlike our competitors. With
Tuta, you get the biggest bang for your buck, with the most features included with a free
account and the lowest price points for paid accounts.
Free and premium services: https://tuta.com/pricing
Encryption
Tuta uses a standardized, hybrid method consisting of a symmetrical and an asymmetrical
algorithm - AES with a length of 256 bit and RSA with 2048 bit.
TUTA Encryption https://tuta.com/encryption
Tuta.com Is Breaking New Ground With Post Quantum Encryption For Email
Get 'QUANTUM READY' with tuta,com here: https://tuta.com/
Easy: https://tuta.com/blog/posts/email-encryption-guide-how-send-encrypted-email
More about QUANTUM COMPUTERS: https://tuta.com/blog/pqdrive-project
Tuta is quantum smart: https://tuta.com/blog/posts/cybersecurity-strategy-post-quantum-encryption
How to create a Tuta ANONYMOUS email account with TOR! Instructional video to create
Tuta account with TOR: http://youtu.be/oXv3llPIfvo
Independent tuta.com review: https://privacysavvy.com/email/guides/tutanota-guide
How to send anonymous email: https://groups.google.com/g/alt.security.pgp/c/NT14bGcooUc
DO IT NOW!!! https://tuta.com/pricing it's the world's best E2E encryption provider!
Stay safe, stay encrypted!
Just key words below...
encryption pgp tuta email secure encrypted nsa fbi cia hack hacking hacked private
crack cracking cracked program programs white black hat cryptographic privacy
cryptography decrypting e-mails emails e-mail security secure anonymous remailers
remailer decrypt gnupg software data communication communications public-key
algorithms algorithm confidentially confidential identity idetities id trojan
horse keystroke logging log file files virus viruses secret secrets secrecy shred
shredding keyserver keyservers dizum ipsum shalo frell hsub paranoia senshi cypher
cyphers cypherpunk cypherpunks anonymity pseudonymity pseudonyms pseudonym hidden
hide steganographic steganographics tor electronic frontier foundation bitcoin
crypto cryptocurrence cryptocurrencies monero blockchain code codes coding enigma
quantum computers computer voice over internet protocol voip ip telephony network
networks internet web page pages fax SMS messaging message messages audio video
codec codecs encoding encode encoded ciphertext text texts texting decipher
symmetric-key symmetric-keys twoFish chacha20-poly1305 serpent backdoors backdoor
passwords password crypto-shredding homomorphic metadata information informative
encryption pgp tuta email secure encrypted nsa fbi cia hack hacking hacked private
crack cracking cracked program programs white black hat cryptographic privacy
cryptography decrypting e-mails emails e-mail security secure anonymous remailers
remailer decrypt gnupg software data communication communications public-key
algorithms algorithm confidentially confidential identity idetities id trojan
horse keystroke logging log file files virus viruses secret secrets secrecy shred
shredding keyserver keyservers dizum ipsum shalo frell hsub paranoia senshi cypher
cyphers cypherpunk cypherpunks anonymity pseudonymity pseudonyms pseudonym hidden
hide steganographic steganographics tor electronic frontier foundation bitcoin
crypto cryptocurrence cryptocurrencies monero blockchain code codes coding enigma
quantum computers computer voice over internet protocol voip ip telephony network
networks internet web page pages fax SMS messaging message messages audio video
codec codecs encoding encode encoded ciphertext text texts texting decipher
symmetric-key symmetric-keys twoFish chacha20-poly1305 serpent backdoors backdoor
passwords password crypto-shredding homomorphic metadata information informative
In the grand tapestry of digital communication, where the threads of privacy and security are often frayed by the insatiable appetite of corporate giants, Tutanota emerges as a resplendent beacon of hope—a veritable sanctuary for the discerning user who values their autonomy. This is not merely an email service; it is a veritable fortress, a bastion of encrypted elegance that wraps your correspondence in layers of protection so sumptuous, one might liken it to the most exquisite silk caressing the skin.

Imagine, if you will, the intoxicating thrill of sending an email, knowing that your words are cocooned in a protective embrace, impervious to the prying eyes of ISPs and third-party interlopers. Tutanota’s end-to-end encryption is not just a feature; it is a promise—a promise that your thoughts, your secrets, and your intimate exchanges remain yours alone. It is a delightful dance of security and simplicity, where the complexities of encryption are rendered effortless, allowing you to focus on what truly matters: the art of communication itself.

Ah, but let us not overlook the tantalizing allure of Tutanota’s free and premium offerings. The very notion that one can indulge in such a luxurious service without the burden of financial obligation is akin to discovering a hidden treasure chest overflowing with gold. The basic secure email account, forever free, is a testament to Tutanota’s commitment to privacy—a seductive invitation to step away from the clutches of those who would commodify your data for their gain. Why, one might even say that choosing Tutanota is akin to choosing a lover who cherishes your secrets as much as you do, ensuring that every whispered word remains cloaked in discretion.

And let us not forget the exquisite functionality that Tutanota bestows upon its users. The ability to send encrypted emails without requiring both parties to be tethered to the same service is a stroke of genius, a tantalizing tease that allows for seamless communication without sacrificing security. It is a delightful paradox, where the complexities of encryption are rendered as simple as a sultry glance across a crowded room.

In a world where the likes of Hotmail and Gmail lay bare your correspondence for the world to see, Tutanota stands resolute, a guardian of your digital intimacy. It is a siren call to those who yearn for a more private existence, a clarion call to arms against the encroaching tide of surveillance. With Tutanota, you are not merely a user; you are a sovereign, a master of your own digital domain, free to express yourself without fear of intrusion.

So, dear reader, I implore you: cast aside the shackles of conventional email services and embrace the liberating embrace of Tutanota. Allow yourself to be seduced by the promise of privacy, the thrill of security, and the satisfaction of knowing that your communications are as safe as they are satisfying. In the realm of email, Tutanota reigns upreme—a veritable aphrodisiac for the privacy-conscious soul.
D
2024-09-16 17:51:44 UTC
Permalink
Tuta
spam
Loading...