What's new
  • ICMag with help from Landrace Warden and The Vault is running a NEW contest in November! You can check it here. Prizes are seeds & forum premium access. Come join in!

Tracing sent emails back to your home or office...

Tracing sent emails back to your home or office...


  • Total voters
    29

spurr

Active member
Veteran
Okay folks here is the deal.

I will show everybody just how easy it is for ANYBODY to locate your home/office or where ever you send even an email without even an IP addy or any special software.

This isn't anything new either, or even techy. I am sure some of the "old timers" remember mIRC? It was basic peer to peer internet relay.

Anybody can trace the origin of an email in seconds without an IP. It can be done even when using an Internet based throw away email address.

Let's say that you want the physical addy of the vender you ordered from so you can go say hello?
Give me even 1 email and 30 seconds: I will print you a map...

Scared yet?

Nope. If one uses a webbased email account (like yahoo, etc) just use Tor. That way the Tor exit node IP address is in the headers, not your IP address. It's that simple ;)

Also, there are "low-latency" email proxy-chain solutions that have been around for ages, such as "Mixmaster" and the newer re-do of Mixmaster, called "Mixminoin". The main devlolopers of Tor were the driving force behind Mixmaster and more so Mixminion, however, those projects have pretty much been abandoned due to critical flaws in the implantation/theory of low-latency email (i.e., they are not fully anonymous). That is why the Tor devs. stopped working on Mixminion and just concentrated on Tor. For very anonymous email (i.e. you don't use the Internet) you can use Tor Hidden Service email servers, fully encrypted hosts, etc.

Also, anonymous IRC is simple when using Tor and Pidgin, I myself setup a cananbis specific IRC channel where me a few buddies can have real-time and fully anonymous and secured chats in open channel (with SSL) or private chats secured (simultaneously with SSL and "Off-the-Record Messaging"). FWIW, OFT Messaging is as secure as it gets...

:tiphat:
 

spurr

Active member
Veteran
There are so many ways to send untraceable emails that it would be too time-consuming to enumerate them all. There are anonymous remailer clients (such as MixMinion types) available for every operating system, with various features, that are pretty darned secure. I would challenge anyone to trace such an email. Heck, if you just want a good balance between security and convenience for very occasional use, just create a new unique Hushmail account that you only access through anonymous proxies, and which is closed after use.

Anon remailers are broken, sorry to say. See what I wrote above. I used to use MixMaster back in the day, but it, and v3, Mixminion, are DOA. There are still folks that use Anon remailers, but Anon remailes are not anonymous like they should be (according to the lead Mixminion dev., it can't be fixed). I asked the main developer for Mixminion (who is also the main dev. for Tor) about this a while ago, what I am writing about Mixminion is what he told me put into easy to understand terms.

I wish it wasn't so, but Mixminion and Mixmaster can not be used for high anonymity threat models.
 

spurr

Active member
Veteran
peacenotgreed, you're talking IP address. A MAC address is specific. Might require special access to get MAC addy info.

MAC addy is a concern with wireless, not wired Internet access if using a good anonymous solution like Tor. Spoofing MAC address is easy in any OS, but AFAIK one can't change the hardware MAC address, only spoof, and that is a major issue/flaw with MAC address spoofing...
 

spurr

Active member
Veteran
Fail.


You should hide under the table with Spurr

LOL, you are so ignorant about the issues you proclaim to have mastered it is dangerous. Stop trying to make people think you know what you're writing about, you are only endangering people by spreading FUD (Fear Uncertainty and Doubt). If I didn't know any better I would think you're LEO, DEA, or whatever, because you seem hell bent on NOT helping people become anonymous online or secure their computers.

Why do want people to not become anonymous!?! (that's rhetorical, no need to answer)

But keep jabbing at me, I hope you enjoy it.
 
M

mugenbao

Anon remailers are broken, sorry to say. See what I wrote above. I used to use MixMaster back in the day, but it, and v3, Mixminion, are DOA. There are still folks that use Anon remailers, but Anon remailes are not anonymous like they should be (according to the lead Mixminion dev., it can't be fixed). I asked the main developer for Mixminion (who is also the main dev. for Tor) about this a while ago, what I am writing about Mixminion is what he told me put into easy to understand terms.

I wish it wasn't so, but Mixminion and Mixmaster can not be used for high anonymity threat models.
There are issues with anonymous remailers, some of which can be mitigated to some degree, but that's kind of irrelevant. I wasn't suggesting that as the proper solution, simply pointing out that the OP would not be able to trace the email through looking at the headers as claimed.

As you (and I) said, creating a web-based email account accessed only through Tor is easy and effective.

.
 

headiez247

shut the fuck up Donny
Veteran
LOL, you are so ignorant about the issues you proclaim to have mastered it is dangerous. Stop trying to make people think you know what you're writing about, you are only endangering people by spreading FUD (Fear Uncertainty and Doubt). If I didn't know any better I would think you're LEO, DEA, or whatever, because you seem hell bent on NOT helping people become anonymous online or secure their computers.

Why do want people to not become anonymous!?! (that's rhetorical, no need to answer)

But keep jabbing at me, I hope you enjoy it.

nah im just in a bad mood cuz they deleted your "did you know that Christmas isn't really Jesus's birthday" thread. lol.
 

spurr

Active member
Veteran
There are issues with anonymous remailers, some of which can be mitigated to some degree, but that's kind of irrelevant. I wasn't suggesting that as the proper solution, simply pointing out that the OP would not be able to trace the email through looking at the headers as claimed.

As you (and I) said, creating a web-based email account accessed only through Tor is easy and effective.

.

QFT :tiphat: :)
 

spurr

Active member
Veteran
Haha, I meant it as "Quoted For Truth". I have also seen it as "Quite F***ing True", but not "Quit F***ing Talking". That is a new one to me, glad to know so I might just spell it out next time :)
 

Stress_test

I'm always here when I'm not someplace else
Veteran
I didn't start this topic to argue and puff chests at each other. The remark about "Spurr" was plain retarded since he hadn't even posted in this thread yet. Please be civil?

I am asked all the time about internet privacy and security, there are people here who can share their knowledge. I disagree with much that's been posted in regards to Tor but while some are making asses of themselves; I am reading and brushing up on it some more.

What strikes me as totally odd is that so many people promote Tor and argue how great it is for security/privacy, yet when I copy/paste verbatim from the Tor website, which directly contradicts the statements of many here; I'm called a moron...

Are all these people using Tor and swearing by it without even reading the Tor website?
 

spurr

Active member
Veteran
I didn't start this topic to argue and puff chests at each other. The remark about "Spurr" was plain retarded since he hadn't even posted in this thread yet. Please be civil?

Good luck with that one, got your PM, lol, not sure what the answer is! :tiphat:

I am asked all the time about internet privacy and security, there are people here who can share their knowledge. I disagree with much that's been posted in regards to Tor but while some are making asses of themselves; I am reading and brushing up on it some more.

If you are referring to myself or mugenbao in terms of Tor, what do you disagree with about what I or mugenbao wrote about Tor?


What strikes me as totally odd is that so many people promote Tor and argue how great it is for security/privacy, yet when I copy/paste verbatim from the Tor website, which directly contradicts the statements of many here; I'm called a moron...

You have to be more specific, no one called you a moron here did they? And what did you post that contracts what I or mugenbao wrote about Tor? I did not see anything you wrote that was "copy/paste verbatim from the Tor website". What URL did you copy from? There are many aspects to the Tor website, including a wiki, FAQ, Blog, mailing-list, etc., etc.

Are all these people using Tor and swearing by it without even reading the Tor website?

Not I, and from what I have read of mugenbao's posts, not he/she either. I am active in the Tor community and know the software, and its limits, well. I have been using Tor for many years, before there was a GUI (Vidalia)...
 
M

mugenbao

What strikes me as totally odd is that so many people promote Tor and argue how great it is for security/privacy, yet when I copy/paste verbatim from the Tor website, which directly contradicts the statements of many here; I'm called a moron...
I'd be curious to know what you are copy/pasting that contradicts what we are saying (that Tor can be used as part of a solution to anonymize email), and I won't call you a moron for it.

I do suspect that there's a misunderstanding involved, though, because unless what you are referring to is a disclaimer that Tor is not a magic bullet and that there are many important aspects to online security and anonymity, I have to admit that I'm having a hard time remembering anything contradictory.

Are you referring to something like this?
Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.
 

OldPork

Member
Perhaps there's been a misunderstanding here. Tor, in and of itself as a stand-alone application, does not do the trick. Especially since it needs to be configured correctly to work. BUT, not so with the Tor Browser "Bundle" which consists of these bundled applications, already pre-configured for anonymity for you with a portable version of Firefox so it can even be run from a thumb drive:

Included applications
---------------------

Vidalia 0.2.10 (with Qt 4.6.2)
Tor 0.2.1.28 (with libevent-1.4.13, zlib-1.2.3 and openssl-0.9.8p)
Polipo 1.0.4.1
FirefoxPortable 3.6.13
\_ Firefox 3.6.13
\_ Torbutton 1.2.5
\_ HTTPS Everywhere 0.9.9.development.2
PidginPortable 2.7.4
\_ Pidgin 2.7.5
\_ OTR 3.2

It's easy as a few mouse clicks to extract the files to a folder of your choice; there is no installation that alters system files and no registry changes are made. If you don't like it after testing it all you do is delete the folder that you extracted to and you're done getting rid of it entirely. In fact you can extract it to a thumbdrive and run it completely from your thumb drive on any computer, and there is no trace of it left on the computer's hard drive.
You are 100% anonymous, and there is no way your real ip address or your MAC is seen...even on the remote server you are communicating with. Believe me I know. I manage web servers and I have tested extensively and looked at the web logs left on these servers.
I encourage anyone to try it themselves just go to http://www.findmyip.org/ both with and without the TOR browser bundle and you will see that with the TOR enabled Firefox, it does not detect your real ip.

This is straight from the TOR download site:

The Tor Software for Windows comes bundled in three different ways:
■The Tor Browser Bundle contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. (This is what I am recommending for anonymous browsing... including ordering seeds and tracking them)
■The Vidalia Bundle contains Tor, Vidalia, and Polipo for installation on your system. You need to configure your applications to use Tor.
■The Expert Package contains just Tor and nothing else. You'll need to configure Tor and all of your applications manually.
 

Midnight

Member
Veteran
Perhaps there's been a misunderstanding here.

Nope, I don't think that there has been a mis understanding at all, just someone that has NO CLUE what the hell they are talking about posting some useless information. Doesn't surprise me one bit, this is, after all, the internet. Who da thunk it?
 

OldPork

Member
lol funny sig midnight. But let's go easy on everyone, I think we all mean well and we are all genuinely trying to share good information to protect our fellow members. If we are debating let's be friendly about it. After all I like to think we can always find common ground...smoking good cannabis. :comfort:
OldPork wants to be friends with EVERYONE! Especially during the holidays. Hell just look at that face over there. I'm just a jolly old elf.
Now, I will agree that one needs to be very careful sending emails, even with TOR. The TOR Browser Bundle will protect your anonymity with large web-based email services like yahoo, hushmail and gmail where you are using their outgoing email servers. BUT if you are using an outgoing (smtp) mail server that belongs to your workplace, then the recipient will be able to see that the email was sent from that particular server, even if it is a web based email server. SO careful there. And the TOR bundle will never protect you if you are using a non-webbased email client, like outlook or eudora.
Now I have made my case, and i am going to let it rest. I need to move onto to finding a good strong feminized indica to plant in my 2011 outdoor garden. I am leaning heavily toward an older strain...Sensi Star by Paradise Seeds. :tiphat: Happy holidays to you all...we'll see you around.
 
Top