With Tor Mail gone, how will the Dark Web communicate?

 

In the recent fall of Freedom Hosting, a hosting service used by much of the Dark Web, the list of casualties is long. One death in particular has already cast the widest shadow of all: Tor Mail is gone.

Long considered the most trustworthy and popular email service on the Dark Web, users have rapidly fled since Freedom Hosting, which maintained Tor Mail’s previously hidden servers, was compromised and destroyed, and its alleged owner, Eric Marques, was arrested in Ireland.  Now, many wonder if Tor Mail’s servers are sitting in a National Security Agency (NSA) office, their contents being read and documented at this very moment.

Dissidents, whistleblowers and journalists have long used Tor Mail. Edward Snowden and Julian Assange are major Tor cheerleaders. But alongside them are some of the most prominent pedophiles and most profitable drug dealers on Web. Nothing about Tor Mail’s demise is certain at this point. We don’t know if its servers have fallen into the hands of criminals or the U.S. government.

Here’s the catch: In theory, it shouldn’t even matter if an NSA agent is browsing through each email at this very moment. Smarter, more careful users of Tor Mail have never sent a clear text email. Software such as PGP (Pretty Good Privacy) takes 15 minutes to master and provides virtually unbreakable encryption, placing emails out of even the NSA’s reach. It’s a breeze. Any cybercriminal worth his weight in stinky California marijuana would take the time to use it, right?

Wrong.

“I post my PGP key everywhere and beg my customers to use it but the majority don’t….. including for some pretty big orders!,” wrote popular ecstasy vendor DrMDA.

“Something like 80 percent of SR users don’t use PGP,” wrote astor, a longtime Silk Roader.

Some vendors, such as prescription drug salesman RxKing, explicitly refuse to deal in PGP, saying it gives a false sense of security.

Sometimes it’s not laziness or complacency, it’s simply a giant mistake.

If you have ever purchased GHB (known as liquid ecstasy or, more commonly, the date rape drug) from the popular Silk Road vendor BlueGiraffe, you may have a bit of worrying to do

BlueGiraffe’s newly hired assistant—yes, top vendors have assistants and entire teams behind their operation—mistakenly emailed the address of every single customer he’s had in over a year of business in clear text. It’s not encrypted, it’s imminently readable, and it’s potentially in the hands of law enforcement right now. Keeping such records is against the rules on Silk Road.

“Though I will never meet any of you in person, you are like a great family that I love and care for very much,” wrote an extremely apologetic BlueGiraffe. “And I have done the worst thing and compromised your safety. I am so sorry.”

Now, despite easy-to-use technology that would have rendered them virtually immune to oversight, thousands of Tor Mail users are perspiring, wondering when the knock on their door will come.

The big question across the Dark Web is what will succeed Tor Mail. Here are the early contenders:

  • BitMessage is a decentralized, encrypted and peer-to-peer messenger. This program has seen a surge in popularity since the Snowden leaks.
  • TorChat is an easy-to-use anonymous messenger designed to fit nicely into the Tor environment. It has been widely used across the Dark Net spectrum since before Tor Mail’s fall.
  • PrivNote is a Clear Net messenger service that deletes notes once they’re read. Silk Road vendor RxKing prefers this service, but others refuse to use it, citing multiple security concerns.
  • SMS4TOR is a Tor-friendly version of PrivNote that has gained considerable traction thanks to its base a Tor hidden service.
  • I2P-Bote uses the I2P anonymizing software to provide a decentralized, encrypted, verified email service. The service is only in alpha and, due to its reliance on I2P, will probably not be widely adopted.
  • Privatdemail is an email service with a focus on privacy (as opposed to anonymity). Here’s a fun fact: You apparently can’t email Israel because the servers are located in an Arab country that forbids it. That policy will not inspire confidence, but even so, Privatdemail is already in use.
  • RiseUp is an email service built for “liberatory social change.” Users must apply and be approved for accounts, proving that they are activists fighting for positive change, which is whatever RiseUp’s founders deem it to be. In exchange, RiseUp keeps minimal logs, encrypts your data and defends your communications unlike many corporate email services.
  • Nym is a remailer that allows you to send encrypted emails without them being traced back to you, the sender.
  • Mixmail is a remailer similar to Nym but is much easier to use. It strips out identifying factors like an IP address, making a quick, anonymous email an easy proposition.
  • Jabber is a popular open-source, decentralized messaging system. It’s widely used by journalists already, particularly in the Middle East.
  • Tox.im is a currently-in-development tool that promises to allow encrypted and decentralized video and text chat reminiscent of Skype—only without Microsoft allowing the American government to listen in as they do.

Even when Tor Mail was the de facto king of Dark Web communication, it was not ubiquitous. Now that trust is in short supply, other services have seen an influx of users in the past week.

Many people have wondered if and when another simple and trustworthy Tor email service will pop up. It’s a major market opportunity that comes with serious risk. Hushmail, a Canadian service that was once upon a time the encrypted email darling of the Dark Web, came under immense pressure from the American government and eventually turned over clear text emails to law enforcement in 2007.

What comes next is anyone’s guess. The only sure thing is that any smart user wishing to maintain privacy ought never to fully trust any service and should always encrypt their communications. Anything less is asking for trouble.

from here

Privacy-Conscious Email Services

 

On this page, you will find a listing of various email service providers.

Visit here to specific informations around their security and privacy (website refreshed every 30 minutes).

Anonymous Speech
Autistici/Inventati
Bitmessage E-Mail Gateway
Co-Mail
Cotse.net
Countermail
Fastmail.fm
Inbox.lv
MyKolab
Neomailbox
Openmailbox
Posteo
Privat DE Mail
RiseUP
Runbox
SAFe-mail
Swissmail
TorGuard E-mail
Unspyable
Vmail.me

from here

Recommended Mail Provider

 

The following email providers are privacy-friendly and offer secure SSL encryption for POP3 and SMTP. The HTTPS encryption for some webinterfaces is not genuinely secure and email tracking features are not blocked at all if you were using webinterfaces. We recommed the usage of email clients like Mozilla Thunderbird for email communication to avoid this flaws. (The random order in the list isn’t an assessment.)

Provider Comment
neomailbox.com offers secure, anonymous e-mail accounts hosted in Swiss, sender IP hiding, for $3.33 per month, anonymous payment with Pecunix, secure HTTPS encryption for webinterface)
Posteo and aikQ German mail providers, servers located in Germany, accounts from 1 € per month, anonymous accounts possible, anonymous payment by letter, secure HTTPS encryption
Mailbox.org German mail provider, servers located in Germany, anonymous accounts from 1 € per month with calendar, addressbook, filesharing, OpenPGP encrypted mailbox and mail delivery only with SSL/TLS possible, sender IP hiding, anonymous payment by letter and Bitcoin, secure HTTPS encryption
JPBerlin German mail provider, political committed, servers located in Germany, accounts from 1 € per month, user address is used only for the bill and fakes are accepted as well, anonymous payment is possible by letter and Bitcoin, secure HTTPS encryption
runbox.com Runbox Solutions AS is a Norwegian limited company, server located in Norway, accounts for $1,66 per month, anonymous payments by postal letter possible, secure HTTPS encryption
VFEmail anonymous mail provider, free and premium, sender IP hiding for premium user, use a temporary e-mail address for registration and choose hosting in Netherlands, disposable addresses, secure HTTPS encryption
ETHICmail offshore corporation (Seycellen), operators are located in Gibraltar, servers located in Japan, Swiss, two accounts from $11.90 per month, emergency wipe of mailbox by SMS possible, secure HTTPS encryption
CryptoHeaven anonymous accounts from $60 per year, offshore corporation, servers located in Canada, flaws in HTTPS encryption
Private DE Mail supported with donations (not free as FreeBeer), free anonymous email accounts with POP3/IMAP/SMTP, operator unknown(!) and NOT listed on website, Tor hidden services for all protocols
XMAIL.net operated by Aaex Corp registrated at British Virgin Islands, server located in Canada, free version with POP3 but without SMTP, premium accounts from $10 per year, flaws in HTTPS encryption
MyKolab.com Swiss hosted groupware with addressbook, calendar and email, email accounts for 4.41 CHF per month with SMTP/IMAP/POP3, groupware accounts for 10 CHF per month, no third party ads used for webinterface, secure HTTPS encryption
Associazione-Investici, Nadir.org, AktiviX.org services for political activists, offers blogs and mailing lists too, you have to give a prove for your political activities but it is not required to give a real name

Due to the US PATRIOT Act (especially p. 215ff) and the fourth amendment to the FISA Amendments Act it is possible for US authorities to eavesdrop on the communication of non US citizens without warrant. According to the US authorities it is enough that the servers are located in the US. In the EC study Fighting cyber crime and protecting privacy in the cloud the authors are warning about political surveillance. That’s why we can recommend the following email providers only partially.

  • SecureNym (offers anonymous e-mail accounts, offshore corporation, servers located in US)
  • Fastmail.fm (free version without SMTP support, premium version full featured, server located in US)
  • Riseup.net (service for political activists, offers blogs and mailing lists too, servers located in US)

Security Notes: Information about long term communication partners can be used to feature out your real identity! If you need a highly anonymous e-mail account to do something – may be for whistleblowing – create a new mail account and use it only for this one job. Delete the account, if the job was done and never use it for other communication partners.

GMail and anonymisation services

User of GMail accounts may have problems using TorBirdy and anonymisation services like JonDonym. The Google account security team wrote an answer because of questions by the Tor community:

Hello,

I work for Google as TL of the account security system that is blocking your access.

Access to Google accounts via Tor (or any anonymizing proxy service) is not allowed unless you have established a track record of using those services beforehand. You have several ways to do that:

  1. With Tor active, log in via the web and answer a security quiz, if any is presented. You may need to receive a code on your phone. If you don’t have a phone number on the account the access may be denied.
  2. Log in via the web without Tor, then activate Tor and log in again WITHOUT clearing cookies. The GAPS cookie on your browser is a large random number that acts as a second factor and will whitelist your access.

Once we see that your account has a track record of being successfully accessed via Tor the security checks are relaxed and you should be able to use TorBirdy.

Hope that helps,

Google account security team

from here

Anonymizing Documents and Pictures

 

Office documents and pictures contain lots of information in the meta tags that may deanonymize their author. Before uploading them to the Internet you should remove this meta data.

Pictures and Fotos

Meta tags in pictures and image files may be deleted in the file manager with a right-click. Choose the option “Remove meta tags” in the context menu. You may select and clean several files at once if you press the <CTRL>-key simultaneously. In the properties dialog of the file manager you may check the success of your attempt to delete the meta information.

metadata anonymisation

Office Documents, PDFs, MP3….

You can use the Metadata Anonymisation Toolkit (MAT) to clean OpenOffice documents, Microsoft Office documents, PDFs and MP3 and FLAC sound files. Archives are supported too. Simply click with right mouse button on the file in the file manager and choose the entry “Metadata Anonymisation (MAT)”.

Alternatively you may open the GUI of MAT. A menu entry you may find in the applications menu in the group “Utilities”. Add the files you want to clean to list clean the list. The cleaned files are stores in the same directory like the original files with the extension “.cleaned” in the name.

Deleting meta information

Documents from unknown source

MAT for documents and “exiv2” for fotos are useful tools to remove meta data from your own, self created files. Both can not anonymise the content, nor handle watermarking, steganography, or any overly customized metadata field/system from unknown source. You have to clean such documents more aggressively:

  • You may print the document with low resolution and scan it afterwards. For scanning of text documents you may use black/white color scheme and a low resolution too. Clean the scan images as descripted above.

from here