On Wed, Jan 16, 2013 at 09:33:08AM +0100, berenger.morel@neutralite.org wrote: > >You're not wrong but would the OP be posting to a web site? > I think yes, if I understood correctly, he needs a way for people > from inside to report his government's amoral/illegal actions. > Using a website is one way in so many others to show those reports, > I guess. > > > >>About mails, it is the same: if the sender does not use encryption > >>systems of mailing standards, then stuff is in clear, otherwise, he > >>is able to encrypt what he send, even when he did not reached the > >>"secured area" given by first server/proxy. > > > >If the recipient doesn't use encryption, and most don't, he/she can't > >read the message.....or did I misread your reply. > > You read correctly. You are true, but is not the problem the same > for browsers? Of course, nowadays, they are configured to be able to > support encryption? > Well, I can not say I really know how secured connection works, so I > probably said some stupid things. IIRC both Tor and chained remailers can't be traced to the OP unless the authorities are monitoring the sender because they deemed him/her suspicious previously. The way around this is to find a service that introduces a random delay in forwarding. Still not 100% secure as *I think* the outgoing encrypted message may be able to be compared to the arriving message before decryption. Your best bet is to find a list, forum, or news group dedicated to security and ask there. -- Bob Holtzman If you think you're getting free lunch, check the price of the beer. Key ID: 8D549279
Attachment:
signature.asc
Description: Digital signature