Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

You dialed 5483.


sci / sci.crypt / Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.

SubjectAuthor
* Protonmail and 'Swiss privacy' remind me of Operation Rubicon.SugarBug
+* Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Anonymous
|+- Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Cri-Cri
|`* Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Yamn Remailer
| `* Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Jan Panteltje
|  `- Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Cri-Cri
+* Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Edward Teach
|`* Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.A Remailer User
| `- Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Anonymous
+- Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.The Running Man
+* Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Edward Teach
|`* Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.A Remailer User
| `- Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.Anonymous
`- Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.The Running Man

1
Subject: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: SugarBug
Newsgroups: sci.crypt, alt.privacy.anon-server
Organization: Baggy Jeans Mafia (sybershock.com)
Date: Mon, 22 Apr 2024 12:05 UTC
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: 3883@sugar.bug (SugarBug)
Newsgroups: sci.crypt,alt.privacy.anon-server
Subject: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Date: Mon, 22 Apr 2024 07:05:43 -0500
Organization: Baggy Jeans Mafia (sybershock.com)
Message-ID: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Info: i2pn2.org;
logging-data="2004080"; mail-complaints-to="usenet@i2pn2.org";
posting-account="yZybWhCr+jI4C3MuGpPde+DhCwsjQrVZrsCOigcx7fM";
X-Spam-Checker-Version: SpamAssassin 4.0.0
View all headers

@firefly@neon.nightbulb.net

Protonmail reminds me of Operation Rubicon.

Propagandists and useful idiots routinely pump Proton Mail as a champion of privacy. They will post links to articles in which some agency or foreign government has requested Proton Mail to hand over user data. Then the article will position 'Swiss privacy laws' as saving the day. This smells of mockingbird media agitprop meant to generate interest in Protonmail. If enough such articles are circulated, the gullible will believe they are protected by 'Swiss privacy' then flock to Protonmail as their 'privacy savior'.

Everything you need to know about so-called 'Swiss Privacy' we learned decades ago from Operation Thesaurus, AKA, Operation Rubicon. We learned that CIA operations and black budget banking are actually headquartered in the Swiss underground.

Operation Rubicon
https://en.wikipedia.org/wiki/Operation_Rubicon

Crypto AG
https://en.wikipedia.org/wiki/Crypto_AG

If you trust any third-party server to protect your privacy, you're a rube. If you trust Proton Mail to protect your privacy, you're a rube getting 'crossed' by the Swiss Rubi-con. Either you own your keys and your data on your computer or else you have no privacy. Someone else's promise that your data will be 'encrypted' so they can't decipher it is a hollow pledge. If you send any form of plaintext to a remote server, no matter how much they claim to encrypt it, you have zero assurance of data privacy. If you use an email server, even if you use end-to-end encryption, you have zero metadata privacy. Anyone can see WHO you are talking to even if they can't see the talk itself. Criminals and spooks are generally more interested in _who_ you talk to over _what_ you say. The _who_ is the most important piece of knowledge for their operations.

When using email for encrypted messages is always better for both parties to use their own email servers. Even better than that is to use a encrypted messenger through a Tor hidden service. The encrypted messenger must NOT rely on the Tor keys for the security of the encryption, but must first encrypt it using secret keys _before_ sending the data over the Tor network. Even with Tor, metadata unmasking is possible through monitoring and traffic correlation attacks. If you are a whistleblower or an at-risk person it is still far safer to send coded messages by other channels.

If you rely on Protonmail and similar services for high-risk communications you are taking a dangerous risk.

Watch the phan boiz rage outlet!

#Cryptography #Cryptology #Encryption #Crypto #Protonmail #CryptoAG #Switzerland #CIA

--
www.sybershock.com | sci.crypt | alt.sources.crypto | alt.lite.bulb

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: Anonymous
Newsgroups: alt.privacy.anon-server, sci.crypt
Organization: dizum.com - The Internet Problem Provider
Date: Mon, 22 Apr 2024 17:07 UTC
References: 1
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Message-Id: <20240422.170719.f0acc138@yamn.paranoici.org>
From: nobody@yamn.paranoici.org (Anonymous)
Mime-Version: 1.0
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Date: Mon, 22 Apr 2024 17:07:19 +0000
Newsgroups: alt.privacy.anon-server,sci.crypt
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.szaf.org!news.karotte.org!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
View all headers

On Mon 22 Apr 2024 3:05 pm, SugarBug wrote:
> If you trust any third-party server to protect your privacy, you're a rube.
If you trust electronic comms you're a rube. Security is offline.

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: Cri-Cri
Newsgroups: alt.privacy.anon-server, sci.crypt
Organization: Easynews - www.easynews.com
Date: Mon, 22 Apr 2024 19:14 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!npeer.as286.net!npeer-ng0.as286.net!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx15.ams4.POSTED!not-for-mail
From: cri@cri.cri.invalid (Cri-Cri)
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Newsgroups: alt.privacy.anon-server,sci.crypt
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
<20240422.170719.f0acc138@yamn.paranoici.org>
MIME-Version: 1.0
x-hc-9: yes
x-no-archive: yes
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 8
Message-ID: <uGyVN.1467978$Rq2.382960@fx15.ams4>
X-Complaints-To: abuse@easynews.com
Organization: Easynews - www.easynews.com
X-Complaints-Info: Please be sure to forward a copy of ALL headers otherwise we will be unable to process your complaint properly.
Date: Mon, 22 Apr 2024 19:14:34 GMT
X-Received-Bytes: 1031
View all headers

On Mon, 22 Apr 2024 17:07:19 +0000, Anonymous wrote:

> Security is offline.

And knowing whom you're dealing with.

--
Cri-Cri

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: Yamn Remailer
Newsgroups: alt.privacy.anon-server, sci.crypt
Organization: dizum.com - The Internet Problem Provider
Date: Mon, 22 Apr 2024 21:12 UTC
References: 1 2
Content-Transfer-Encoding: 7bit
From: noreply@mixmin.net (Yamn Remailer)
Content-Type: text/plain; charset=us-ascii
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Mime-Version: 1.0
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
<20240422.170719.f0acc138@yamn.paranoici.org>
Message-Id: <20240422.221213.b8e85811@mixmin.net>
Date: Mon, 22 Apr 2024 22:12:13 +0100
Newsgroups: alt.privacy.anon-server,sci.crypt
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
View all headers

Anonymous <nobody@yamn.paranoici.org> wrote:
>On Mon 22 Apr 2024 3:05 pm, SugarBug wrote:

>> If you trust any third-party server to protect your privacy, you're a rube.
> If you trust electronic comms you're a rube. Security is offline.

I doubt it. Offline, which means non-virtual interaction by
exchanging physical media, inevitably leaves much more traces than
electronic communication, to be exact asynchronous anonymous onion
routing as done with a combination of Tor & Mixmaster / YAMN. Just
think of fingerprints or DNA contamination of communication media, the
kind of paper, ink or printer and toner you use, the postoffice that
took delivery of your letter and so on. And I've no idea how to
create an anonymous real world reply channel as offered by our
nymservers. No, provided that your device isn't compromised anonymous
remailing is the best we have, state of the art in this field.

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: Jan Panteltje
Newsgroups: alt.privacy.anon-server, sci.crypt
Date: Tue, 23 Apr 2024 06:44 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: alien@comet.invalid (Jan Panteltje)
Newsgroups: alt.privacy.anon-server,sci.crypt
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Date: Tue, 23 Apr 2024 06:44:23 GMT
Message-ID: <v07lc8$cl5k$1@solani.org>
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com> <20240422.170719.f0acc138@yamn.paranoici.org> <20240422.221213.b8e85811@mixmin.net>
MIME-Version: 1.0
Content-Type: text/plain; ISO-8859-15
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 23 Apr 2024 06:44:24 -0000 (UTC)
Injection-Info: solani.org;
logging-data="414900"; mail-complaints-to="abuse@news.solani.org"
User-Agent: NewsFleX-1.5.7.5 (Linux-5.15.32-v7l+)
Cancel-Lock: sha1:38e1VbfE0VE51Snmp1hRsgsb/10=
X-Newsreader-location: NewsFleX-1.5.7.5 (c) 'LIGHTSPEED' off line news reader for the Linux platform
NewsFleX homepage: http://www.panteltje.nl/panteltje/newsflex/ and ftp download ftp://sunsite.unc.edu/pub/linux/system/news/readers/
X-User-ID: eJwFwQkBwDAIA0BLhZIAcjoe/xJ2h0thuRE0LNYY4o9ZhN70vVR/GH2C6S1z+SbpDVbUiIkvo5Se0edY/zR/FMU=
View all headers

On a sunny day (Mon, 22 Apr 2024 22:12:13 +0100) it happened Yamn Remailer
<noreply@mixmin.net> wrote in <20240422.221213.b8e85811@mixmin.net>:

>Anonymous <nobody@yamn.paranoici.org> wrote:
>>On Mon 22 Apr 2024 3:05 pm, SugarBug wrote:
>
>>> If you trust any third-party server to protect your privacy, you're a rube.
>> If you trust electronic comms you're a rube. Security is offline.
>
>I doubt it. Offline, which means non-virtual interaction by
>exchanging physical media, inevitably leaves much more traces than
>electronic communication, to be exact asynchronous anonymous onion
>routing as done with a combination of Tor & Mixmaster / YAMN. Just
>think of fingerprints or DNA contamination of communication media, the
>kind of paper, ink or printer and toner you use, the postoffice that
>took delivery of your letter and so on. And I've no idea how to
>create an anonymous real world reply channel as offered by our
>nymservers. No, provided that your device isn't compromised anonymous
>remailing is the best we have, state of the art in this field.

With 2 TB micro SD cards homing pigeons are good for lots of data in a short time.
Of course adversaries can target the pigeon holders,
The next step is to add the info to the DNA of animals...
or just to the regular mail or objects as contamination..
;-)

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: Cri-Cri
Newsgroups: alt.privacy.anon-server, sci.crypt
Organization: Easynews - www.easynews.com
Date: Wed, 24 Apr 2024 18:14 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!3.eu.feeder.erje.net!feeder.erje.net!npeer.as286.net!npeer-ng0.as286.net!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx16.ams4.POSTED!not-for-mail
From: cri@cri.cri.invalid (Cri-Cri)
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Newsgroups: alt.privacy.anon-server,sci.crypt
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
<20240422.170719.f0acc138@yamn.paranoici.org>
<20240422.221213.b8e85811@mixmin.net> <v07lc8$cl5k$1@solani.org>
MIME-Version: 1.0
x-hc-9: yes
x-no-archive: yes
User-Agent: Pan/0.155 (Kherson; fc5a80b8)
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 9
Message-ID: <o_bWN.19914570$ee1.18204928@fx16.ams4>
X-Complaints-To: abuse@easynews.com
Organization: Easynews - www.easynews.com
X-Complaints-Info: Please be sure to forward a copy of ALL headers otherwise we will be unable to process your complaint properly.
Date: Wed, 24 Apr 2024 18:14:44 GMT
X-Received-Bytes: 1182
View all headers

On Tue, 23 Apr 2024 06:44:23 GMT, Jan Panteltje wrote:

> With 2 TB micro SD cards homing pigeons are good for lots of data in a
> short time.

Slower: Growing trees in the form of a QR code? ;)

--
Cri-Cri

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: Edward Teach
Newsgroups: sci.crypt, alt.privacy.anon-server
Organization: A noiseless patient Spider
Date: Sun, 2 Jun 2024 10:17 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hackbeard@linuxmail.org (Edward Teach)
Newsgroups: sci.crypt,alt.privacy.anon-server
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Date: Sun, 2 Jun 2024 11:17:22 +0100
Organization: A noiseless patient Spider
Lines: 80
Message-ID: <20240602111722.1279e423@fedora>
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 02 Jun 2024 12:17:23 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="10d90ded8ef9c89ef4b496553e36982b";
logging-data="3479869"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/KT2uIgUKB3KiOQreBl1eNSW7oCUhlXD8="
Cancel-Lock: sha1:7kcNapQ7MbAGMIv9LdHdfHp4Xw4=
X-Newsreader: Claws Mail 4.2.0 (GTK 3.24.42; x86_64-redhat-linux-gnu)
View all headers

On Mon, 22 Apr 2024 07:05:43 -0500
SugarBug <3883@sugar.bug> wrote:

> @firefly@neon.nightbulb.net
>
> Protonmail reminds me of Operation Rubicon.
>
> Propagandists and useful idiots routinely pump Proton Mail as a
> champion of privacy. They will post links to articles in which some
> agency or foreign government has requested Proton Mail to hand over
> user data. Then the article will position 'Swiss privacy laws' as
> saving the day. This smells of mockingbird media agitprop meant to
> generate interest in Protonmail. If enough such articles are
> circulated, the gullible will believe they are protected by 'Swiss
> privacy' then flock to Protonmail as their 'privacy savior'.
>
> Everything you need to know about so-called 'Swiss Privacy' we
> learned decades ago from Operation Thesaurus, AKA, Operation Rubicon.
> We learned that CIA operations and black budget banking are actually
> headquartered in the Swiss underground.
>
> Operation Rubicon
> https://en.wikipedia.org/wiki/Operation_Rubicon
>
> Crypto AG
> https://en.wikipedia.org/wiki/Crypto_AG
>
> If you trust any third-party server to protect your privacy, you're a
> rube. If you trust Proton Mail to protect your privacy, you're a rube
> getting 'crossed' by the Swiss Rubi-con. Either you own your keys and
> your data on your computer or else you have no privacy. Someone
> else's promise that your data will be 'encrypted' so they can't
> decipher it is a hollow pledge. If you send any form of plaintext to
> a remote server, no matter how much they claim to encrypt it, you
> have zero assurance of data privacy. If you use an email server, even
> if you use end-to-end encryption, you have zero metadata privacy.
> Anyone can see WHO you are talking to even if they can't see the talk
> itself. Criminals and spooks are generally more interested in _who_
> you talk to over _what_ you say. The _who_ is the most important
> piece of knowledge for their operations.
>
> When using email for encrypted messages is always better for both
> parties to use their own email servers. Even better than that is to
> use a encrypted messenger through a Tor hidden service. The encrypted
> messenger must NOT rely on the Tor keys for the security of the
> encryption, but must first encrypt it using secret keys _before_
> sending the data over the Tor network. Even with Tor, metadata
> unmasking is possible through monitoring and traffic correlation
> attacks. If you are a whistleblower or an at-risk person it is still
> far safer to send coded messages by other channels.
>
> If you rely on Protonmail and similar services for high-risk
> communications you are taking a dangerous risk.
>
> Watch the phan boiz rage outlet!
>
> #Cryptography #Cryptology #Encryption #Crypto #Protonmail #CryptoAG
> #Switzerland #CIA
>

@SugarBug
Much of what you say is perfectly valid. That said, there are
intermediate steps that people can take....not getting to complete
anonymity or perfect privacy.....but a step or two better than nothing!
(1) Anonymity. You can use mail addresses from MAIL.COM. When you do
this you also need to make sure that these mail addresses are only used
from public places (say internet cafes) so that both the email address
and the IP address are not linked to a single person. Of course the
RECIPIENT email address(es) might give the game away!
(2) Privacy. I'm always amused when people talk about "public key
infrastructure", say PGP and the like. Any group of people can set up
a Diffie/Hellman protocol. With this in place EVERY MESSAGE gets a
random throwaway shared secret encryption key. There are no published
keys anywhere....the keys are calculated when needed and then destroyed.
(3) E2EE. Any group using items #1 and #2 are giving the snoops MUCH
more work. Of course, snooping will not be impossible......but it
might be made very difficult, both on the privacy side and on the
anonymity side.....and without huge amounts of heavy lifting for the
users.

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: The Running Man
Newsgroups: sci.crypt
Organization: EasyNews
Date: Sun, 2 Jun 2024 11:41 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: runningman@writeable.com (The Running Man)
Newsgroups: sci.crypt
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Date: Sun, 2 Jun 2024 11:41:40 -0000 (UTC)
Organization: EasyNews
Lines: 21
Message-ID: <YlfBhH2MgD++pYblHNnyJaRKUeaeEoGV5goJ5pNg8JU=@writeable.com>
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
Injection-Date: Sun, 02 Jun 2024 13:41:40 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="1d9761e5914ceadd08a6715ba60a2152";
logging-data="3512683"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+vh1e0dL3ZMmc4jwACrYVxjuJtWsv6Oao="
Cancel-Lock: sha1:sf/wVQuPg5HMTQtu8xggcss/sCc=
View all headers

On 22/04/2024 07:05 SugarBug <3883@sugar.bug> wrote:
> @firefly@neon.nightbulb.net
>
> Protonmail reminds me of Operation Rubicon.
>
> Propagandists and useful idiots routinely pump Proton Mail as a champion of privacy. They will post links to articles in which some agency or foreign government has requested Proton Mail to hand over user data. Then the article will position 'Swiss privacy laws' as saving the day. This smells of mockingbird media agitprop meant to generate interest in Protonmail. If enough such articles are circulated, the gullible will believe they are protected by 'Swiss privacy' then flock to Protonmail as their 'privacy savior'.
>
> Everything you need to know about so-called 'Swiss Privacy' we learned decades ago from Operation Thesaurus, AKA, Operation Rubicon. We learned that CIA operations and black budget banking are actually headquartered in the Swiss underground.
>
> Operation Rubicon
> https://en.wikipedia.org/wiki/Operation_Rubicon
>
> Crypto AG
> https://en.wikipedia.org/wiki/Crypto_AG
>
> If you trust any third-party server to protect your privacy, you're a rube. If you trust Proton Mail to protect your privacy, you're a rube getting 'crossed' by the Swiss Rubi-con. Either you own your keys and your data on your computer or else you have no privacy. Someone else's promise that your data will be 'encrypted' so they can't decipher it is a hollow pledge. If you send any form of plaintext to a remote server, no matter how much they claim to encrypt it, you have zero assurance of data privacy. If you use an email server, even if you use end-to-end encryption, you have zero metadata privacy. Anyone can see WHO you are talking to even if they can't see the talk itself. Criminals and spooks are generally more interested in _who_ you talk to over _what_ you say. The _who_ is the most important piece of knowledge for their operations.
>
> When using email for encrypted messages is always better for both parties to use their own email servers. Even better than that is to use a encrypted messenger through a Tor hidden service. The encrypted messenger must NOT rely on the Tor keys for the security of the encryption, but must first encrypt it using secret keys _before_ sending the data over the Tor network. Even with Tor, metadata unmasking is possible through monitoring and traffic correlation attacks. If you are a whistleblower or an at-risk person it is still far safer to send coded messages by other channels.
>

I agree 100%. Use PGP or S/MIME on your own computer. Anyone that uses online encrypted e-mail services is a dunce.

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: A Remailer User
Newsgroups: alt.privacy.anon-server, sci.crypt
Organization: dizum.com - The Internet Problem Provider
Date: Sun, 2 Jun 2024 14:29 UTC
References: 1 2
From: remailer-user@somewhere.invalid (A Remailer User)
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
<20240602111722.1279e423@fedora>
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Message-ID: <8da81d633a62a310d53b535ddf737e9e@dizum.com>
Date: Sun, 2 Jun 2024 16:29:01 +0200 (CEST)
Newsgroups: alt.privacy.anon-server,sci.crypt
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
View all headers

Edward Teach <hackbeard@linuxmail.org> wrote:
>On Mon, 22 Apr 2024 07:05:43 -0500
>SugarBug <3883@sugar.bug> wrote:
>
>> @firefly@neon.nightbulb.net
>>
>> Protonmail reminds me of Operation Rubicon.
>>
>> Propagandists and useful idiots routinely pump Proton Mail as a
>> champion of privacy. They will post links to articles in which some
>> agency or foreign government has requested Proton Mail to hand over
>> user data. Then the article will position 'Swiss privacy laws' as
>> saving the day. This smells of mockingbird media agitprop meant to
>> generate interest in Protonmail. If enough such articles are
>> circulated, the gullible will believe they are protected by 'Swiss
>> privacy' then flock to Protonmail as their 'privacy savior'.
>>
>> Everything you need to know about so-called 'Swiss Privacy' we
>> learned decades ago from Operation Thesaurus, AKA, Operation Rubicon.
>> We learned that CIA operations and black budget banking are actually
>> headquartered in the Swiss underground.
>>
>> Operation Rubicon
>> https://en.wikipedia.org/wiki/Operation_Rubicon
>>
>> Crypto AG
>> https://en.wikipedia.org/wiki/Crypto_AG
>>
>> If you trust any third-party server to protect your privacy, you're a
>> rube. If you trust Proton Mail to protect your privacy, you're a rube
>> getting 'crossed' by the Swiss Rubi-con. Either you own your keys and
>> your data on your computer or else you have no privacy. Someone
>> else's promise that your data will be 'encrypted' so they can't
>> decipher it is a hollow pledge. If you send any form of plaintext to
>> a remote server, no matter how much they claim to encrypt it, you
>> have zero assurance of data privacy. If you use an email server, even
>> if you use end-to-end encryption, you have zero metadata privacy.
>> Anyone can see WHO you are talking to even if they can't see the talk
>> itself. Criminals and spooks are generally more interested in _who_
>> you talk to over _what_ you say. The _who_ is the most important
>> piece of knowledge for their operations.
>>
>> When using email for encrypted messages is always better for both
>> parties to use their own email servers. Even better than that is to
>> use a encrypted messenger through a Tor hidden service. The encrypted
>> messenger must NOT rely on the Tor keys for the security of the
>> encryption, but must first encrypt it using secret keys _before_
>> sending the data over the Tor network. Even with Tor, metadata
>> unmasking is possible through monitoring and traffic correlation
>> attacks. If you are a whistleblower or an at-risk person it is still
>> far safer to send coded messages by other channels.
>>
>> If you rely on Protonmail and similar services for high-risk
>> communications you are taking a dangerous risk.
>>
>> Watch the phan boiz rage outlet!
>>
>> #Cryptography #Cryptology #Encryption #Crypto #Protonmail #CryptoAG
>> #Switzerland #CIA
>>
>
>@SugarBug
>Much of what you say is perfectly valid. That said, there are
>intermediate steps that people can take....not getting to complete
>anonymity or perfect privacy.....but a step or two better than nothing!
>(1) Anonymity. You can use mail addresses from MAIL.COM. When you do
>this you also need to make sure that these mail addresses are only used
>from public places (say internet cafes) so that both the email address
>and the IP address are not linked to a single person. Of course the
>RECIPIENT email address(es) might give the game away!

For that purpose we do have nymservers, controlled through anonymous
remailers.

>(2) Privacy. I'm always amused when people talk about "public key
>infrastructure", say PGP and the like. Any group of people can set up
>a Diffie/Hellman protocol. With this in place EVERY MESSAGE gets a
>random throwaway shared secret encryption key. There are no published
>keys anywhere....the keys are calculated when needed and then destroyed.

How will you implement DH key negotiations while preserving the
anonymity of both participants?

>(3) E2EE. Any group using items #1 and #2 are giving the snoops MUCH
>more work. Of course, snooping will not be impossible......but it
>might be made very difficult, both on the privacy side and on the
>anonymity side.....and without huge amounts of heavy lifting for the
>users.

Let each participant set up an anonymous mail account at a nymserver,
exchange public keys with the initial mail message and from then on use
Whole-Message-Encryption. Problem solved.

Have a look at the Wikipedia section about anonymous remailing
(https://en.wikipedia.org/wiki/Anonymous_remailer), which currently is
no more than an empty shell and urgently needs an update adding all the
software projects this still most secure and universally applicable
method of anonymous communication bases on (Mixmaster, YAMN,
Quicksilver, OmniMix).

https://en.wikipedia.org/wiki/Mixmaster_anonymous_remailer

| Original author(s) Lance Cottrell
| Developer(s) Len Sassaman and Peter Palfrader
| Stable release 3.0 / March 3, 2008
| Type Anonymous remailer
| Website http://mixmaster.sourceforge.net/

e.g. makes you think that anonymous remailing is dead, which is dead
wrong. Mixmaster continues to work great, in addition we now have the
YAMN network, and there's client software, that allows a seamless
integration into your e-mailing workflow.

There's a comprehensive link list at https://danner-net.de/omd.htm#d05.

With these tools at hand implementing the Chaumian Mix network strategy
and onion routing there's no reason to rely on the integrity of any
service provider. So better stay away from all these dubious con men
and their questionable promises.

Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
From: Anonymous
Newsgroups: alt.privacy.anon-server, sci.crypt
Organization: dizum.com - The Internet Problem Provider
Date: Tue, 4 Jun 2024 18:41 UTC
References: 1 2 3
References: <d222eca70ea6b2e9a763257229c781d5$1@sybershock.com>
<20240602111722.1279e423@fedora> <8da81d633a62a310d53b535ddf737e9e@dizum.com>
Subject: Re: Protonmail and 'Swiss privacy' remind me of Operation Rubicon.
Message-Id: <20240604.184118.89078905@yamn.paranoici.org>
From: nobody@yamn.paranoici.org (Anonymous)
Date: Tue, 4 Jun 2024 18:41:18 +0000
Newsgroups: alt.privacy.anon-server,sci.crypt
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
View all headers

A Remailer User <remailer-user@somewhere.invalid> wrote:

> Edward Teach <hackbeard@linuxmail.org> wrote:

>> Much of what you say is perfectly valid. That said, there are
>> intermediate steps that people can take....not getting to complete
>> anonymity or perfect privacy.....but a step or two better than nothing!
>> (1) Anonymity. You can use mail addresses from MAIL.COM. When you do
>> this you also need to make sure that these mail addresses are only used
>> from public places (say internet cafes) so that both the email address
>> and the IP address are not linked to a single person. Of course the
>> RECIPIENT email address(es) might give the game away!
>
> For that purpose we do have nymservers, controlled through anonymous
> remailers.
>
>> (2) Privacy. I'm always amused when people talk about "public key
>> infrastructure", say PGP and the like. Any group of people can set up
>> a Diffie/Hellman protocol. With this in place EVERY MESSAGE gets a
>> random throwaway shared secret encryption key. There are no published
>> keys anywhere....the keys are calculated when needed and then destroyed.
>
> How will you implement DH key negotiations while preserving the
> anonymity of both participants?
>
>> (3) E2EE. Any group using items #1 and #2 are giving the snoops MUCH
>> more work. Of course, snooping will not be impossible......but it
>> might be made very difficult, both on the privacy side and on the
>> anonymity side.....and without huge amounts of heavy lifting for the
>> users.
>
> Let each participant set up an anonymous mail account at a nymserver,
> exchange public keys with the initial mail message and from then on use
> Whole-Message-Encryption. Problem solved.
>
>
> Have a look at the Wikipedia section about anonymous remailing
> (https://en.wikipedia.org/wiki/Anonymous_remailer), which currently is
> no more than an empty shell and urgently needs an update adding all the
> software projects this still most secure and universally applicable
> method of anonymous communication bases on (Mixmaster, YAMN,
> Quicksilver, OmniMix).
>
> https://en.wikipedia.org/wiki/Mixmaster_anonymous_remailer
>
> | Original author(s) Lance Cottrell
> | Developer(s) Len Sassaman and Peter Palfrader
> | Stable release 3.0 / March 3, 2008
> | Type Anonymous remailer
> | Website http://mixmaster.sourceforge.net/
>
> e.g. makes you think that anonymous remailing is dead, which is dead
> wrong. Mixmaster continues to work great, in addition we now have the
> YAMN network, and there's client software, that allows a seamless
> integration into your e-mailing workflow.

Are you aware of
http://en.wikipedia.org/w/index.php?title=Anonymous_remailer&diff=prev&oldid=260821642

There's obviously someone who aims at dampening awareness of anonymous
remailing, which makes it even more attractive, at least to me.

Anyone out there with a Wikipedia account willing to update the remailer
section with contents we put together here? For years nobody took steps
against such blandant censorship. Isn't it time to put things straight?

1

rocksolid light 0.9.8
clearnet tor