I posted this a while back I think it is worth posting again in light of what is happening.
The contents of Hushmail are encrypted and secure but the moment you list it in your forums profile the account is traceable to you if you access the forums without a encrypted proxy. Encrypted proxy servers like Tor, Zero Knowledge, Anonmizer and others hide your IP address and everything that you do from your ISP. Home pages on your ISP are a dead giveaway and link you back to your email account listed in your profile. Look at the properties on pictures posted and you will often see a direct link to the home page on the users ISP server some under directories with first initial and last name or screen name of the account owner. Home pages on other than your ISP server created behind an encrypted proxy are a much safer way to go. Give some thought to how exposed you are.
Anonymity on the internet comes at a price. I had to create this account because I compromised my last one by forgetfully accessing it when my proxy server was down. I cannot make any connection between this account and several hundred posts made under the previous one. Call me paranoid in a land of mandatory minimums and prison rapes. Why make it easy for them to do a data harvest without ever leaving their desks.
Not only does your ISP know who you are, but the computers you visit on the Internet know who your ISP is. Unless you take preventative measures, any computer you visit online can trace you back to your ISP. This is because each computer on the Internet, including yours, depends on an Internet Protocol (IP) number to figure out where to send that webpage you just requested, or that email you just checked. When you log onto the Internet, your ISP assigns your computer an IP number for that session. And IP numbers can easily be traced back to the assigning ISP. All ISP keep server logs which are archived and can be data mined for a particular account to establish links to web pages viewed, chat servers visited, messages sent with time place and date neatly listed.
Packet sniffers are at all major fiber hubs providing the ability to monitor data going into a re-mailer and out of it even if the timing is varied. If the little padlock isn’t showing your not on a secure site. Encryption between you and a proxy is secure and your IP remains hidden from any site you visit even if it is not encrypted. An unencrypted site can be monitored by packet sniffers for passwords PM messages, email addresses basically anything coming in or going out.
So, if your ISP knows who you are, and every computer you visit on the Internet knows who your ISP is, then it's just a hop, skip and subpoena to connect the dots. If you've said something nasty about a company whose stock price has just cost you your early retirement, or blown the whistle on some corporate illegalities, your IP address leaves a trail of breadcrumbs that leads to your ISP, and thence to your door. (Note that the real "bad guys" of the Internet—the spammers, worm and virus writers, and the like—have sophisticated methods to "spoof" or hide their IP numbers, so you'll not be catching them this way.)
Full article athttp://www.eff.org/deeplinks/archives/003375.phphttp://www.epic.org/privacy/carnivore/
The popularity of packet sniffing stems from the fact that it sees everything. Typical items sniffed include:
• SMTP, POP, IMAP traffic
Allows intruder to read the actual e-mail.
• POP, IMAP, HTTP Basic, Telnet authentication
Reads passwords off the wire in clear-text.
• SMB, NFS, FTP traffic
Reads files of the wire.
• SQL databse
Reads financial transactions and credit card numbers.
US confirms that the FBI has files on activist groupshttp://www.taipeitimes.com/News/world/archives/2005/07/19/2003264143
The NCS already receives real-time data from Verisign Corp., which oversees two of the Internet's 12 root servers that tell computers around the world how to reach key Internet domains. The company gave the government a software tool that allows the NCS to monitor the health of all 12 root servers for free.
Lumeta Corp., a Somerset N.J.-based Bell Labs spinoff, sold the NCS large amounts of data pinpointing thousands of the most crucial routers on the Internet. Lumeta chief scientist Bill Cheswick helped create the first map of the Internet, which has been used to study Internet routing problems and distributed denial-of-service attacks.
One of the first companies successfully approached by the NCS was Boston-based Akamai Technologies, a company that makes software to monitor Web traffic for suspicious events. The company also sells a product that identifies the geographic location and network origin of visitors accessing customers' Web sites. Akamai CEO George Conrades is a board member of the Internet Corporation for Assigned Names and Numbers (ICANN), the company that manages the Internet's worldwide addressing system.
Courts have upheld requests for production of documents that required companies to spend tens of thousands, and even millions of dollars to retrieve 'deleted' information or information stored on back-up tapes and servers.
Assentor Discovery is the enterprise solution for discovery and investigation of the message and content archives created by Assentor Archive. Powerful, efficient and high volume searching and document production capabilities make responding to discovery and litigation requests easy, fast and user-friendly.
Regardless of archive size or content types (e.g. email messages, attachments, instant messages or documents), Assentor Discovery provides legal departments with the capability to investigate the message and content archives and storage media and provide a workflow solution around the litigation support process.http://whitepaper.informationweek.com/cmpinformationweek/search/browse/55066/55066.jsphttp://www.usaonwatch.org/Login.aspx?ReturnUrl=%2fstartwatch%2findex.aspx