w6yx5
My feedback
7 results found
-
22 votesw6yx5 supported this idea ·
-
5 votesw6yx5 supported this idea ·
-
11 votesw6yx5 supported this idea ·
-
202 votesw6yx5 supported this idea ·
-
882 votesw6yx5 supported this idea ·
-
13 votes
An error occurred while saving the comment w6yx5 supported this idea · -
7 votesw6yx5 supported this idea ·
An error occurred while saving the comment w6yx5 commentedI sign all outgoing mails by default, so for some exceptions (like the SimpleLogin alias addresses) I have to go into the settings and disable the option to sign my mails by default. Only then can I send my mails unsigned.... I also have to make sure that the PGP key is not sent in the attachments.
So the problem is:
-> PGP key is also sent (if activated in the settings)
-> Outgoing e-mail is signed with your own e-mail signature, which the recipient who receives the e-mail via the alias service can still see...
The idea that the clients communicate exclusively in the TOR network is a good one. This would make communication within the Tor network invisible to the Clearnet. The only thing that a theoretical threat actor could see would be the connection to the Tor network.
This would allow the full potential of Tor to be used rather than "only" using it as an IP-anonymizing network.