Announcement

Collapse
No announcement yet.

secure mail

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • secure mail

    Is it ok to email example a cyber-rights account from a ziplip account and vice versa?

    Why/why not?

  • #2
    no, stick with cyber to cyber (or another hushmail type account) becasue it does not realize/accept the hushmail code..

    Comment


    • #3
      ok why? what can happen they are both secure right?

      Comment


      • #4
        sorry I edited the first post. hushmail/cyber-rights uses a code. ziplip will not accept it. try to send it and see what it says (send unencrypted?)

        Comment


        • #5
          shit so even though it's secure someone can pick it up in transit?

          Comment


          • #6
            it's secure being that it's not attached to your name. However to use the hush encryption engine, you need to go cyber to cyber or another hushmail account....

            Comment


            • #7
              Here is a good article, not by me...


              YOUR COMPUTER:



              YOUR EMAIL:

              I’m secure you think, it's my email and it's as personal as you can get.right? Plus, I use Ziplip http://www.ziplip.com/ or the like. No!! Not unless you and the person you are sending to are both using Ziplip and you are using a password protecting every message. Simply sending an email from Ziplip is not secure! Let me repeat that again for the people who insist on using Ziplip incorrectly. Simply sending an email from Ziplip is not secure! Emails sitting on Ziplip's servers not password protected, can easily be picked over by Carnivore or Ziplip employees. Now I am not saying Ziplip is a bad service. It is in fact secure and safe if used correctly (still the issue of how to exchange passwords securely is a serious flaw in Ziplip). Now, since no one uses it correctly lets just give it up. Ok good job, we are all going to give zZiplip up right? I hope so. Now on to real email, hands down HUSHMAIL http://www.hushmail.com/ is leaps and bounds superior to Ziplip. HUSHMAIL is secure end to end. Period!

              Emails and attachments are secure without the need for a separate password as long as both parties are using HUSHMAIL. This takes all the guess work out of this. Emails won’t sit on the server unencryped for Carnivore, and Hushmail employees cannot read them. It’s so simple a 5 yr. old could use it. It’s truly an amazing system. Please check it out. When HUSHMAIL first appeared there were rumors that it wasn’t secure at all, well Phil Zimrnerrnann was brought on as chief technology officer of HUSHMAIL. He is the creator of PGP, and would never put his reputation in the encryption community on the line for a shady company not living up to its promises. Phil’s commitment to the company gives me even more faith that HUSHMAIL is the premier email and web based encryption company on the net by far. Also another good feature of HUSHMAIL is that its subsidiaries http://www.cyber-rights.net and http://www.elitefitness.com and http://www.keptprivate.net/ are all compatible with it. If you don’t like using Hushmail, I suggest you learn to use PGP. Otherwise Carnivore is picking your emails for key words.

              How does it feel to be watched? Bloody damn awefull! Correct? Right!

              MONETARY TRANSACTIONS:

              Ok, all sellers and traders on the Net -- please read carefully. What the hell are you doing taking money by mail from people you don’t know ... well?? Where do you get your balls big enough to do so? Shame on you!

              Sellers should view every single customer as a Fed or law enforcement until they have proven they are not. Are you going to give your address to a Fed? Well how do you know you haven’t so far? Believe me, the Feds and whatnot monitor the Information Highway far more frequently than you or anyone will have you believe. Far more frequently! They have all types of gizmos and gadgets that frequently and randomly intercept into all communicational feeds on the internet. How long would it take a Fed to find out all the personal info on a PMB, PO Box, or Home Address? I would bet less than 10 minutes. Tops! I’ve never had any problems getting the real info using a PI even on a PMB. Then of course, once the Feds have your box they have it flagged, and for months packages are watched and let through then they’ve got ya. Ok so what’s the smart thing to do here? I would say lets start by not giving out our addresses to strangers. Instead payments should be made electronically. Simple and efficient.

              Only 5 companies make my cut http://www.evocash.com/ (I consider the best as cheapest fees), http://www.e-gold.com and http://www.e-bullion.com Western Union, and Moneygram. Reason for this is they are well backed, can be 100% anonymous, and safe. Evocash is my first choice as its fees are cheap, you are 100% anonymous with them, and they do not cooperate with law enforcement agencies as they are offshore and out of US jurisdiction. Sellers, I know you are reluctant to make your customers use these services, because they are resistant to change and may take their business elsewhere, but if all sources go to these methods we will all be safer. Buyers, when a seller won’t let you to pay by mail, remember they will be around longer and less likely to get busted taking your guys money with them. Wake up!

              Good luck and surf smart and more importantly...stay alert!

              Hackhunter

              Comment


              • #8
                good point most guys dont realize this and send zip to hush..its just not safe..unless your asking about the weather
                dep

                Comment


                • #9
                  good post bump!

                  Comment


                  • #10
                    Excellent read.

                    Comment


                    • #11
                      good read thanks.

                      Comment


                      • #12
                        This should be a sticky

                        ^ump

                        Comment

                        Working...
                        X