sciencekda.blogg.se

Sign up for protonmail
Sign up for protonmail













sign up for protonmail

So, for instance, someone that works at my ISP or for my cellular provider or (github/twilio/twitter). My threat model is simply individuals working at providers I use that get curious and go hunting for my traffic. My threat model is not state level actors or law enforcement. Let me explain both my threat model and my use-case. But if you're looking to hide your identity or location from your service provider and the authorities then it's barely a speedbump. This is great to make sure companies don't sell your phone number or use it to create some social graph, and to access your accounts independent of your normal phone. That's a long traceable chain that can be compromised or at least broken (to force you out) at every link. And you forward to your own mail server which again does little to hide anything. It's still in your proximity even if it's not in your name so anyone able to obtain your IPs from the services you use would also be able to get the location of your mule. It gives you very little in terms of anonimity, which is why you'd go to Tor anyway.

sign up for protonmail

Authorities may even know who you are but will be unable to locate you.īut the mule only gives you some extra functionality, resilience, and is like having an email address just for spam or a home VPN endpoint. This way you anonimously create the account and then keep your location hidden using Tor. If you need it one time for registration while staying anonymous using a burner SIM will work just fine.















Sign up for protonmail