PDA

View Full Version : Don't be a Petraeus: A Tutorial on Anonymous Email Accounts



Magda Hassan
11-30-2012, 11:45 PM
Don't be a Petraeus: A Tutorial on Anonymous Email Accounts


Tomorrow, as the Senate Judiciary Committee (https://www.eff.org/deeplinks/2012/11/ecpa-and-mire-dc-politics-we-shouldnt-have-trade-video-privacy-get-common-sense) considers reforming (http://www.digitaldueprocess.org/index.cfm?objectid=37940370-2551-11DF-8E02000C296BA163) the decades-old federal email privacy law (https://ilt.eff.org/index.php/Privacy:_Stored_Communications_Act), the personal Inboxes and love lives of senior military and intelligence figures may be on that august body's mind. When the FBI pored through the personal lives of CIA Director David Petraeus, Paula Broadwell, Jill Kelly and General John Allen, citizens across the land began to wonder how the FBI could get that kind of information, both legally (https://www.eff.org/deeplinks/2012/11/when-will-our-email-betray-us-email-privacy-primer-light-petraeus-saga) and technically.
So, just how do you exchange messages with someone, without leaving discoverable records with your webmail provider? This is an important practical skill, whether you need to use it to keep your love life private, to talk confidentially with a journalist, or because you're engaged in politics in a country where the authorities use law enforcement and surveillance methods against you.
The current state of anonymous communication tools is not perfect, but there here are some steps that, if followed rigorously, might have protected the Director of the CIA, the Commander, U.S. Forces Afghanistan, and their friends against such effortless intrusion into their private affairs.
Pseudonymous webmail with TorAccording to press reports (https://www.nytimes.com/2012/11/12/us/us-officials-say-petraeuss-affair-known-in-summer.html), Broadwell and Petraeus used pseudonymous webmail accounts to talk to each other. That was a prudent first step, but it was ineffectual once the government examined Google's logs to find the IP address that Broadwell was using to log into her pseudonymous account, and then checked to see what other, non-pseudonymous, accounts had been used from the same IP address. Under current US law, much of this information receives inadequate protection, and could be obtained from a webmail provider by the FBI without even requiring a warrant.
Because webmail providers like Google choose to keep extremely extensive logs1 (https://www.eff.org/deeplinks/2012/11/tutorial-how-create-anonymous-email-accounts#footnote1_ija661x), protecting your pseudonymous webmail against this kind of de-anonymization attack requires forethought and discipline.
You should use the Tor Browser Bundle when setting up and accessing your webmail account.You must always use Tor. If you mess up just once and log into the pseudonymous account from your real IP address, chances are that your webmail provider will keep linkable records about you forever. You will also need to ensure that you do not give your webmail provider anyinformation that is linked to your real world identity. For instance, if prompted for an email account, do not use another real account during signup; use a throwaway address (http://www.ghacks.net/2012/05/31/the-ultimate-disposable-email-provider-list-2012/) instead.
Download the Tor Browser BundleTo use Tor, start by downloading the Tor Browser Bundle by going to Tor Download page:https://www.torproject.org/download/download-easy.html.en, shown in the screenshot below, and click on the Download button for the appropriate browser bundle for your operating system. The screenshot below shows the Tor Browser Bundle for Windows.
https://www.eff.org/sites/default/files/images_insert/Tor-%20Download%20Page.png
The Tor Bowser Bundle is a zip self-extracting archive. Click "extract" to extract the files from the archive.
https://www.eff.org/sites/default/files/images_insert/Tor-%20Extract%20Location.png
To start the Tor Browser in Windows, go to Local Disk-->Program Files-->Tor Browser and double click on "Start Tor Browser," shown in the screenshot below:
https://www.eff.org/sites/default/files/images_insert/Tor-%20Opening%20Browser.png
When the Tor Browser launches, it will automatically test itself to see if Tor is working correctly. If Tor is correctly anonymizing your traffic, it will display a message saying, "Congratulations. Your browser is configured to use Tor." It will also display the IP address that your traffic appears to be coming from. This is the IP address your webmail provider will see when you go to set up your webmail account.
https://www.eff.org/sites/default/files/images_insert/Tor%20Browser%20Homepage.png
Set Up A Webmail AccountNow that you have your Tor Browser up and running, use it to set up a new webmail account, ideally with a provider that you do not otherwise use. Using a separate webmail provider will help you to distinguish between your anonymous account and your regular email account. Hushmail allows users to set up new webmail accounts while using Tor to protect their anonymity, which is why we are using it in this tutorial. Note that Hushmail has a checkeredhistory (http://www.wired.com/threatlevel/2007/11/encrypted-e-mai/), but it is the only webmail service we are aware of that allows the use of Tor in this way--something we'd like to see changed. Google tries to prevent people from signing up for Gmail accounts pseudonymously, and alternatives like Yahoo! Mail are missing HTTPS protection (https://www.eff.org/document/letter-marissa-mayer). Without both HTTPS and Tor at the time of creation and use, your account is not truly anonymous (https://www.eff.org/pages/tor-and-https). As an added precaution, you may want to use public wifi at an Internet cafe or a library whenever you connect.
To set up your Hushmail account, go to https://www.hushmail.com/start, shown in the screenshot below, and click the "Try Hushmail" button, which will allow you to set up a free Hushmail account.
https://www.eff.org/sites/default/files/images_insert/Try%20Hushmail.png
Fill in the form shown in the screenshot below. Remember to choose a strong password. You must also check a box acknowledging that Hushmail will cooperate fully with authorities pursuing evidence via valid legal channels. This means that, given a proper court order, Hushmail may give up metadata about your messages--the IP addresses you've been logging in from (luckily you use Tor every single time), the times you've logged into your webmail, and the email addresses of the people with whom you've been corresponding. Hushmail may even give up the contents of your messages to law enforcement, and has in the past (http://www.wired.com/threatlevel/2007/11/encrypted-e-mai/) as we note above, which is why you want to make sure that your messages never contain any information that may give your identity away if you wish to remain anonymous. If you are concerned about law enforcement obtaining the contents of your emails from Hushmail, you should encrypt your email correspondence using OpenPGP (http://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP).
https://www.eff.org/sites/default/files/images_insert/Hushmail%20Create%20Account.png
When you send messages via Hushmail, beware the "Ecrypt" checkbox, shown in the screenshot below. This is not end-to-end encryption like PGP. Hushmail will still have access to the plaintext of your email messages. This means that you are not safe from de-anonymization via the clues you type into your pseudonymous emails.
https://www.eff.org/sites/default/files/images_insert/Hushmail%20Encryption.png
Using End-to-End Encryption With Your Pseudonymous Email AccountSetting up pseudonymous PGP/GPG (https://en.wikipedia.org/wiki/GNU_Privacy_Guard) in Hushmail is an complicated task that lies outside the scope of this tutorial. You are unlikely to do it safely unless you are quite technically sophisticated, and any mistakes could break the pseudonymity of your account. If you do want to attempt to do this, here are some considerations to bear in mind:

You will need to make a new key just for your pseudonymous account and the other pseudonymous people you want to talk to will need to do the same
You will need to figure out a way to exchange public key fingerprints with them. Your Hushmail accounts are probably good enough for this.
You will need to make sure that all of the software you use to handle the key (intentionally or unintentionally) is always Torified
If you use PGP normally for non-pseudonymous purposes, you will need to make sure that no PGP software uses or produces evidence of one key in the context of your other identity.
ConclusionAnonymous online communication is a valuable tool for journalists, whistleblowers, dissidents, and Directors of the CIA. As you can see, it is still quite hard to do and do well, and few people will have the discipline necessary to ensure that their webmail provider can never disclose their IP address or inter-account linkages, because the provider will never see the identifying information in the first place. Technologists all over the world are hard at work, improving the usability of all sorts of anonymous online communications tools, and we look forward to the day when all people who need to exercise their freedom of expression can do so safely, simply, and anonymously.
https://www.eff.org/deeplinks/2012/11/tutorial-how-create-anonymous-email-accounts

1. (https://www.eff.org/deeplinks/2012/11/tutorial-how-create-anonymous-email-accounts#footnoteref1_ija661x)Google keeps logs of IP addresses for 18 months, after which they keep logs of three-quarters of the IP address. Three-quarters of an IP address may be still enough to breach your pseudonymity in the case of an FBI investigation.

Peter Lemkin
12-01-2012, 08:12 AM
Thanks Magda. It really is hard these days...and doing PGP properly is a LOT of work...and the NSA can break it if they specifically try....so I'm told....not if you are not a specific important target.....but they likely keep a list of those who use encryption to the extent they can. Brave New World of 1984 out there. It is exactly to be able to decrypt and store forever [let alone correlate all info on everyone on the planet] that that HUGE new NSA facility is being built in Utah...and no coincidence it is being built there among all those Mormons who will be working there doing 'gods' work for the 'promised land'.


Google keeps logs of IP addresses for 18 months, after which they keep logs of three-quarters of the IP address. Three-quarters of an IP address may be still enough to breach your pseudonymity in the case of an FBI investigation. FUCK Google and all the others who work on behalf of the National Spy State! [Protecting us from our Freedoms!]