PDA

View Full Version : With everything else being tracked, can emails also be?



mojo
3rd April 2016, 06:38
What if someone emails you and you respond back? Never thought until now about emails. Do we still have privacy or can people track an ip on emails? I know the gov can but sometimes I wish we still had some privacy.

Red Skywalker
3rd April 2016, 08:54
I have no prove of it, but I think absolutely. Once you go online with whatever you do, you are spied upon, of course including your emails. Sorry, that devils thing called a computer, based on digital technique sucks all of your privacy to certain groups we seemed not to get rid off. We are caged souls and that's probably forever. It may still take hundreds of years, if not thousands, before some individuals maybe free themselves. Despite many positive promises, forget real freedom. We will not see any Real progress. My experience is it looks like there are many 'awakened' people, but the fast 99,9999% majority keeps hanging on religion dogma's, authorities, need for a monetary system and wrong scientific theories, not based on true life force. The awakened will be suffering under them and do so for their far future soul evolution. This planet, and even the whole galaxy, is an experiment kept in quarantine as part of all the possibilities that must exist in infinity. And we are trapped in it. Good luck and suffer as much as you can, there is no hope other then then returning to the full nothingness and start completely all over again.


Wifi / Cellphone Digital Noise beating 24/7 your nerves to cage you:

http://home.kpn.nl/chip/download/Digitalnoise.mp3

Taken from 927.000 Mhz /AM


OK, how negative can you get at this moment. This is what you are led to think. Maybe is enough, enough and we have already suffered thousands of years. But we still have to do it ourselves by understanding that we are not dependent on religions, authorities, money and harmful technology. Maybe NOW is the amazing turning point in the timeline of our galaxy and I need the experience to see that happen before I return home. Lets keep on working together to happen that for all souls of our galaxy.


(Timeline weather: cloudy, partial rain and low temperatures. Storm)

bluestflame
3rd April 2016, 09:48
anything in electronic form maybe the reason they built that mass storage database in utah is so they can sift back through it all later on as the super com
puters get faster , wouldn't want to miss anything , this is real reason for data spy laws , so they have the legalities covered on all info collected since the date it came into effect

NeedleThreader
3rd April 2016, 11:53
Absolutely, big internet is in bed with the NSA. Thats what the Patriot Act is all about, which emerged right after the internet exploded in 2000.

http://100percentfedup.com/google-facebook-attending-bilderbergs-2015-luxury-secret-policy-conference/

http://consciouslyenlightened.com/urgent-jade-helm-nsa-a-i-and-bilderbergs-partnering-with-facebook/#

http://www.theguardian.com/world/2014/feb/03/microsoft-facebook-google-yahoo-fisa-surveillance-requests

Bill Ryan
3rd April 2016, 12:26
.
Yes (sorry to shock you!) — it's pretty easy to find an IP address from an e-mail. You don't have to be the NSA.

See this guide... http://whatismyipaddress.com/trace-email
... and there are many others.

If you've been sent an e-mail to your Gmail account, for example, here's what you do. Go to "Show original" in this pull-down menu:

http://projectavalon.net/find_IP_1.gif

That then reveals what's called the e-mail 'header':

http://projectavalon.net/find_IP_2.gif

Now, sometimes it can be a little tricky (the above is very simplified because I sent the sample e-mail to myself just now: the header is usually longer and more complex than that). But basically, looking at all the coded information in the header, if there seem to be several different IP addresses there, the IP address of the sender is the one that's seen last — i.e. the one nearest to the bottom.

I can usually figure out a sender's IP myself (and sometimes, with the kind of things I get, I do need to know) — but if I'm in doubt, I send a copy of the header to Paul or Ilie and they can tell me straight away. But note: some e-mail providers do make it hard or impossible to see the originating IP.

Because this is often so easy for others to do, I use the TOR browser (https://www.torproject.org/projects/torbrowser.html.en). Highly recommended for keeping yourself anonymous on the net, at least as far as hiding your IP is concerned.

Tor bounces your message all over the world before delivering it, so that it's impossible to see where it's actually from. (It also falsifies your footprints in web pages you visit, or searches you do.) In the above example, my IP address seems to be 176.126.252.11. That's in Romania... not where I really am. :)

sunpaw
3rd April 2016, 19:15
yes, they are.

I've seen some 'maps' of how this data is 'used' for instance. 'Circles' and what else can be read about it. (Maybe I find it again, it was quiet interesting)
Sometimes - it appears - whats 'typed' is also of use (key words for advertising, ...).

Aurelius
3rd April 2016, 23:39
What if someone emails you and you respond back? Never thought until now about emails. Do we still have privacy or can people track an ip on emails? I know the gov can but sometimes I wish we still had some privacy.

not only can they track by ip, in some countries they archive the whole email as well (not just the metadata).

ps. this (http://protonmail.com) (http://protonmail.com) should make email content harder to intercept (provided you use the full encryption functionality).

seah
4th April 2016, 01:36
We've lost our privacy but tracking goes both ways. Some disinformation agents have been caught red handed by their IP address on emails sent.

gord
4th April 2016, 02:34
If you piss off the wrong people enough, there is NO privacy of any kind.

Wind
4th April 2016, 13:12
I'm sure that pretty much everyhing which can be hacked most certainly will be hacked. It's another story if your data is of any interest to anyone.

Bill Ryan
4th April 2016, 13:17
.
Back in 2006, in the heart of the Serpo intrigue, I received an anonymous e-mail that I still remember:





"Don't be surprised if your own thoughts are being pulled out of your head."

Aurelius
4th April 2016, 21:28
.
Back in 2006, in the heart of the Serpo intrigue, I received an anonymous e-mail that I still remember:





"Don't be surprised if your own thoughts are being pulled out of your head."


the essence of thought is magnetic in nature. but not the type of magnetism we are familiar with, it is a much higher field strength. if one knows how to operate in this realm, sadly yes, one can pull thoughts right out of someones head. let's just hope that those with this knowledge / capability have ethics. the last place this should reside is in the hands of the human race at its current stage of evolution. unfortunately as we know this may not be the case. remote viewing & remote influencing achieve this phenomena using like for like (mind to mind), operating a craft achieves this quasi like for like.

BMJ
8th April 2016, 01:52
William Binney - The Government is Profiling You (The NSA is Spying on You)

qB3KR8fWNh0

Snocrash
17th August 2016, 08:12
I work in IT, and so just to clarify a few things for you guys ...

The IP address in an email is of the server the email was sent from. If you're using an email client, like Outlook, it will be the IP address of the domain you configured for the SMTP/IMAP server. If you're sending an email online, like in Gmail, then it will be the IP of that server (i.e. Google's server). It doesn't identify you uniquely, though it could be used to track down your ISP and from there law enforcement could request the information on your email account.

Also, typically IPs are handed out geographically, and so the IP could be used to tell what country you're located in (if you're sending from an ISP in that country). In rarer cases, it can sometimes narrow you down to a region like the East Coast, USA or even a city... but that's usually not reliable these days since companies are much larger now and have locations all over their respective countries and so even though you're using an ISP on the West Coast it may still translate to an East Coast location because their email servers are located there.

*UPDATE* - Actually, I didn't realize email clients still did this, but it look like some still do send the "X-Originating-IP" and this will identify the IP you sent from. So my statements above are not entirely correct. The server IP is sent, but it looks like your unique IP may also be sent too. So depending on your ISP provider this could identify you uniquely, however some ISP's expire IPs and so it's not completely reliable. The IP you sent an email with today may be assigned to someone else tomorrow.

When an email is sent, it must be routed through a series of central servers before it gets to it's destination (just like everything you do on the internet)... and so yes, if the government or any enterprising entity had control of one of these servers they could technically monitor any and all communication that goes through it. But it would be a *huge* amount of data to track, and so I imagine the software they use is very limiting. They would probably have to monitor specific key words or email addresses and only log the disparate data that matches them, and then try to piece together intelligence based on the random conversations matching these things. So the average person does not need to worry much about these things, you would have to be a significant threat for them to care enough to filter all this data just for you.

This is not to say you should not enable yourself and protect your privacy. I highly recommend this, and some things you can do is ...

- use a VPN to protect your identity and location when online - I highly recommend BolehVPN (https://www.bolehvpn.net/)

- do not provide identifying information when signing up to an email account

- do not provide identifying information when making payments for the email service (this one is difficult to achieve, unless the service provider offers a cash option then Bitcoin is the closest you're probably going to get, even though it's not perfect too)

- use PGP to encrypt your email communications (this can be difficult for the technically challenged, and so one option is to use a service like Countermail (https://countermail.com))

Johnny
17th August 2016, 08:38
Because this is often so easy for others to do, I use the TOR browser (https://www.torproject.org/projects/torbrowser.html.en). Highly recommended for keeping yourself anonymous on the net, at least as far as hiding your IP is concerned.



What make you think that the Tor browser not are made by people connected to NSA. If I was in NSA I would made such a project, make it free etc. All 'the black sheep' would be in one place !

For something to reach you, it has to have your IP address in the end. Not that I want to make it a bad day for anybody, just my thoughts !!!


Johnny :)

Bob
23rd August 2016, 14:09
MoJo and the Group - please see PA thread: http://projectavalon.net/forum4/showthread.php?92451-Project-Sauron-active-since-at-least-2011&p=1088770&viewfull=1#post1088770 - referencing TOR and NSA's techniques, and

http://projectavalon.net/forum4/showthread.php?92451-Project-Sauron-active-since-at-least-2011&p=1088508&viewfull=1#post1088508 - about the source article on how TOR is tracked.

and

http://projectavalon.net/forum4/showthread.php?92719-NSA-Treats-and-Tricks&p=1091300&viewfull=1#post1091300 - Hervé s thread of the NSA 'leaks' and captured spytools and procedures.

YES - emails are captured by the look of it.

Something I've wondered about, what happens when one hits DELETE and expects to permanently ERASE the emails from one's trash let's say from that "mail server" (secure or otherwise).

JUST WHO owns one's "trash" when one hits delete all/empty all? Of course we are only 'trusting' that the trash is really deleted and not routed "elsewhere".

- "WHO OWNS 'your' TRASH?" could provide a basis for legal "spying" too.. hmmm

http://www.freeemailtutorials.com/yahooMailTutorials/i/Final-confirmation-to-delete-emails-from-the-Yahoo-Mail-Trash-folder.jpg



http://0.tqn.com/d/politicalhumor/1/M/p/M/6/Cell-Phone-Privacy.jpg

KiwiElf
23rd August 2016, 15:08
According to Snowden's revelations & the latest leaks discussed in Hervé's thread (above), if you're connected to the internet or a mobile phone (even with some very robust protection), every single file on your device is accessible and should "they" choose to do so, "they" can effectively take control of it (ie activate the camera, microphone etc, download malicious software or even turn it into a brick ;)).

Snowden revealed some of this in a 2015 interview with John Oliver (ie the "dick pics" - hilarious, but true)

XEVlyP4_11M

It's my understanding that emails could be hacked many years ago, perhaps even directly from the server.

Of course, "they" have to have a good reason to do so ;)

EXAMPLE: A recent claim is being made that all of Hillary's deleted emails have been captured by the State Department, NSA, Russia and Wikileaks (and probably more! ;))

Years ago I accidentally deleted a bunch of my emails on the remote server (not stored on my own computer), and phoned the provider straight away, and got them back. He explained it was a bit like the way Nortons can recover recently deleted files on your hard drive - they're just tagged as "deleted" and will eventually be overwritten, not really removed - if you're quick enough.

Things might be a bit different these days tho :)

TargeT
23rd August 2016, 15:41
Because this is often so easy for others to do, I use the TOR browser (https://www.torproject.org/projects/torbrowser.html.en). Highly recommended for keeping yourself anonymous on the net, at least as far as hiding your IP is concerned.

Tor bounces your message all over the world before delivering it, so that it's impossible to see where it's actually from. (It also falsifies your footprints in web pages you visit, or searches you do.) In the above example, my IP address seems to be 176.126.252.11. That's in Romania... not where I really am. :)


just an FYI:

TOR is completely compromised and probably always has been.


To me, this is enough to doubt it:

The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997.[18][19][20]
https://en.wikipedia.org/wiki/Tor_(anonymity_network)


However, a quick google search of "TOR COMPROMISED" will show you it's been done several times.
7G1LjQSYM5Q

In reality there is almost no that I know of to stop a motivated attacker & absolutely no way to stop a motivated & funded attacker.... all that computer security is currently boils down to is a philosophy of "hardening" aka making your self a harder target than the next guy, so you will be over looked.


Our advantage currently is the numbers... we (they) aren't good at parsing data yet & the FLOOD of collected information is not being leveraged well "against us"; it's mostly used to back-track through history and find "dirt"... so just keep that in mind when considering your online activities.