[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ent / 777 / posad / i / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Embed
Password (For file deletion.)

Matrix

Pleroma

Mumble

Discord

IRC

Text Boards



File: 1608525825243.jpg (23.79 KB, 480x360, 9f0bdf62311485b859e0078e84….jpg)

 No.39

Is protonmail a honeypot?
>Trying to sign up on .onion links back to .com
>Can't sign up with vpn
>Only accepts crypto after you've signed up

There's absolutely no reason for not allowing sign-ups with vpns/TOR and activating the accounts after the payment has gone through
Do there exist any alternatives that aren't glowies?
>>

 No.40

WTF is in your emails that is so sensitive you go to all this effort tho? Like are you sending assassination plans to your homies or something?
>>

 No.41

If you're trusting your opsec into some third party company, you deserve it.
Use cock.li if you want some e-mail service you know you can't trust, but is at least bullshit-free (if you ignore vc).
But if you (really) know what you're doing you can just use any popular provider, Google included.
>>

 No.42

It's likely to be a honeypot since Protonmail already cooperated with law enforcement. Also, Swiss confederation recently reduced their privacy laws. Its policies should scare every anti-capitalist human. Initially, Protonmail was suppressed in Google search results but now it's the second for "secure private mail provider"
For more info:
https://digdeeper.neocities.org/ghost/email.html#ProtonMail

>>40
Glowie detected. Everything is sensitive except what is meant to be public. Otherwise you become the commodity.https://riseup.net/en/security/resources/radical-servers

>>41
This. But cock.li-founder is anti-leftist. Please use and support a radical tech collective in your area.
https://riseup.net/en/security/resources/radical-servers
Don't forget to use PGP.
>>

 No.43

>>42
>cock.li-founder is anti-leftist
vc is merely pretending to be retarded, why would you care anyways?
>radical tech collective
Hackerspaces are cringe and bluepilled.
>>

 No.44

>>43
Glow.
>>

 No.45

>>42
Riseup has rules that suggest they're reading your emails (the only way they could enforce them).
>>

 No.46

>>44
Enjoy your hobo hangout.
>>

 No.47

>>46
Go away NSA
>>

 No.48

>>47
>Anyone who criticize my lifestyle is a federal agent!
The begginers' guide to anarcho-liberal political discourse.
>>

 No.49

>>48
Not today CIA
>>

 No.50

It was pretty much advertised in Mr.Robot, so most likely.
>>

 No.572

>>45
They only ratted out actual scammers tho.
>>

 No.1587

It's always connecting me to Utah, and the Swiss keep the Nazis' gold for them.
>>

 No.1589

The OP poisoned the well by baiting schizo-posting.
>>

 No.1597

>i just need the bandwidth and minimum bullshit and i know how to use PGP
cock.li

>i can pay 1 euro a month

posteo.de

>i know someone that has a riseup account

riseup.net
>>

 No.1766

registering protonmail nowadays is unreliable - most of the time they want a phone number. sometimes it works with a "recovery" email. temporary emails won't work, but you can easily create a throwaway yandex mail account for that purpose.
i'm talking about registering over Tor, i have no experience with clearnet.
>>

 No.2778

>OP: Is [x] a honeypot
>Poster1: What are you hiding
>Poster2: Yeah dude duh of course its a honey
>Poster3: Poster1 glows

You could make a thread asking that question about literally any piece of popular software and you will get the same exact answer OP.

And that answer is yes, you should always assume the software you're using isn't secure, because on some level it isn't.

The only serious way to OpSec is either hundreds of layers of encryption and disinfo added between your backdoored email clients, computer hardware, and router connections

or you can manufacture your own logic gates, operating system, and computer network.
>>

 No.2786

>>1766
This has changed recently. I've managed to create a couple of protonmail accounts using throwaway email addresses (guerrillamail) for verification, while leaving recovery email address blank.
Doesn't necessarily work with every Tor exit node, but it doesn't take a lot of circuit switching to find one that works.

Not that anybody should simply trust protonmail. It's just useful if you need to create an account on some site that requires "legit" email address. As long as you thoroughly compartmentalize each of your "operations" you might as well use protonmail as your main/personal email provider.
>>

 No.4981

Imagine not proxy chaining into a sock5 from tor so you look normal…

How do you even browse on tor? Literally everything is blocked.
>>

 No.5618

>>39
Tor is also so a honeypot so it really doesn't matter.
>>

 No.5619

Regardless of provider you should be encrypting any e-mail with sensitive information anyway.
>>

 No.5624

>>4981
>Imagine not proxy chaining into a sock5 from tor so you look normal…
How do you do this? What services host sock5 that I can use?
>>

 No.5626

>Is protonmail a honeypot?
unlikely
>Do there exist any alternatives that aren't glowies?
Tutanota and some other onion only sites.
>bonus question
>should you take your meds?
Yes you paranoid schizo
>>

 No.5629

Protonmail is hosted in Israel.
>>

 No.5654

>>Can't sign up with vpn
I did. Multiple times. Get a good one.
Plus you can sign up on Tor if you don't mind a small delay emailing their anti-spam department.
>>

 No.5655

>>4981
Literally! I can't even post here!
>>

 No.7876

>>39
kek had that same experience OP, see: >>7850
>>

 No.7877

>Can't sign up with vpn
>implying
>>

 No.10557

Is Tutanota good? And can I create multiple accounts for free using my VPN?
>>

 No.10574

>>39
Turn off onion redirects in the Tor settings and sign up with .com only. Then it does work. Protonmail has gotten increasingly suspicious, Tutanota is cooperating with law enforcement and has to accept the new law in Germany.

Basically any email service that claims to be secure and private is a lie. Email is insecure from the ground up. Maybe someone should create a leftymail. I could set that up
>>

 No.10575

>>5618
Tor is not a honeypot stoopid, its just the exit notes for domains like .com, but if you visit .onion its safe. All the stories about deanonymisation were human error or exit nodes.
>>

 No.10576

>>1597
yo got an invite for cock.li? they went invite only some time ago. Posteo seems good, but they still need to accept the new German state trojan (literarly how its called) and snooping laws.
>>

 No.10577

oh fuck, just realized how long this thread is - rip
>>

 No.10611

>>10574
>Basically any email service that claims to be secure and private is a lie.
Whatever the actual case is, one should always assume any email provider is or can get compromised, so if you really want your messages to stay private encrypt them with PGP. Of course that still doesn't take care of the metadata which one should also take into consideration.

Then there's a further problem that most people use pozzed email providers like gmail and don't know how to use PGP, so whatever you send to those people (and is sent to you by them) will be used to profile you as well.
>>

 No.10618

EVERYTHING IS A HONEYPOT

GOOD

EMBRACE IT

USE THE MOST POZZED SERVICES YOU CAN

LITERALLY CC IN YOUR THREE LETTER AGENCIES TO YOUR PLANS AND MANIFESTOS

FUCK HIDING
>>

 No.10627

If you are really serious about it then you can set up your own email service on a machine, buy a domain name and point it to your mail server.
BUT as >>10611 pointed out the main problem is that basically everybody uses the pozzed botnet email providers basically rendering any privacy effort on email useless.
The problem is people's lazyness and stupidity, as always.
>>

 No.10643

>>46
no u

>>43
he stills gay and most likely a lolifag owo
>>

 No.10646

File: 1628542880694.png (556.65 KB, 512x512, 1628294968462.png)

how do i get a freakling riseup invite
>>

 No.10654

>>10646
Come to my place and I'll give you an invite code. I'm here:
1000 Colonial Farm Road, McLean, VA 22101, United States
>>

 No.10661

File: 1628704286473.png (55.35 KB, 1239x649, ClipboardImage.png)

Since when is cock.li invite only?

can anyone give me an invite btw?
>>

 No.10681

>>10675
so based
>>10661
i stole ur invite, i will post another later
>>

 No.10802

>Can't sign up with vpn
Proof
>>

 No.10808

So this happened recently:
https://nitter.eu/tenacioustek/status/1434604102676271106

Remember to use their onion address.
>>

 No.10809

>>10681
>>10675
wow it takes months to get these lol
>>10808
swiss law, but still proof that they lie and are probably 100% glowing
seems that with email and most tech you can either have privacy or security but not both
>>

 No.10810

>>10809
>proof that they lie
What was the lie exactly?
>>

 No.10811

>>10810
>By default, we do not keep any IP logs which can be linked to your anonymous email account.
Legal context aside, this statement evaluates to false
>>

 No.10812

>>10811
Whelp, I've had about enough of this shit. Time to get a home email server setup already.
>>

 No.10814

the entire internet is an honeypot. once you get there you're fucked.
>>

 No.10815

>>5626
t. your cia glowie
>>

 No.10822

I don't care much about the server side of things because I heavily compartmentalize and torify my email usage anyway, so it's not very helpful for their big data algos. For the most part I use one email account per identity per website - that includes multiple email accounts for a single website in case of multiple logins. That's a lot of email accounts.

Which is why I'm searching for an email provider that:
- isn't a pain in the ass to register an account with
- provides IMAP support for free so I can automate my email checks

Is there anything like that out there?

>>10808
What's essential is to use Tor, the onion service is just a cherry on the cake, but Tor by itself already hides your origin IP even if you connect to a clearnet address.

Unfortunately their onion service is not configured for its purpose, so it will often refuse to login you with the message "too many recent login attempts". That's probably because they left their clearnet checks in place. Most of the people who set up onion services don't use Tor themselves so there's really very little testing involved.

Unique IPs: 10

[Return][Go to top] [Catalog] | [Home][Post a Reply]
Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ent / 777 / posad / i / R9K / dead ] [ meta ]