Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Self-Hosted E-mail Alternatives 1

Likes Microsoft writes: It seems likely that the NSA's PRISM program is an extension of previously known efforts to tap and record large portions of information-rich internet traffic. Namely, as discussed in Security Now #408, the NSA is probably tapping internet traffic close to where it goes in and out of the likes of Google, Microsoft and Yahoo, as well as large ISP's. Most SMTP e-mail traffic is unencrypted in any way, and I don't like the idea that even without a warrant, the government can be snooping my communications in a catch-all dragnet.

I read the Slashdot discussion, Ask Slashdot: Self-Hosted Gmail Alternatives. However, I am mainly interested in getting my e-mail traffic away from the fat pipes that the NSA is most likely to be drinking from. I would be willing to consider a high-quality, low-traffic webmail service that might sidestep at least some of the surveillance. Of course, since I subscribe to one of those large ISP's (Comcast), and don't have much other choice in my location, I would need to be able to connect using well-secured SSL in the browser or with POP/IMAP.

Comment Re:Fakery (Score 1) 248

In fact, at least when it comes to the web presence of anything to purports to be a journal, one Web of Trust site would already be up to the task, with browser plugins available. Users just need to crank down the "Trustworthiness" know on any flim-flam journal site they come across. One just needs to hope that hordes of creationists and climate-change deniers don't then start gaming this for their own agendas.

Comment Technology is not just computers/software (Score 2) 71

I've looked over the comments on this thread with frustration, seeing that the conversation swiftly derailed into being *just* about Crypto. The MCTL covers all areas of technology that may be deemed militarily critical. It is not really possible to find a publicly hosted .gov or .mil site that gives much info any more, but this university page stills shows the 20 areas covered: http://www.wright.edu/rsp/Security/T1threat/Mctl.htm , including things like space systems and nuclear technologies.

Comment Re:Not very long term (Score 2) 61

Ubuntu's current practice is a 5 year term for LTS. Microsoft's 10 years leads to supporting pretty ancient stuff (in Internet time, anyway). They were forced to extend XP support all the way to 13 years since Vista and Windows 7 can't run reasonably on a lot of the hardware that XP was happy on.

For the previous decade, I personally think 5-8 years somewhere is a good LTS term for operating systems and kernels.

Now that CPU's aren't really getting faster, just more cores and energy efficiency, perhaps 10-20 years may again be reasonable.

Comment Re:Dont trust anonymous (Score 2) 180

As a true conspiracy nut, I would not put it past 1. the FBI to have gotten its data from Blue Toad or 2. Blue Toad covering up for the FBI.

Exactly. The FBI doesn't have to have gotten the data directly from Apple or NSA hackers or somesuch. However, you can't discount that the hackers might have been motivated to lie in order to smear the FBI, too.

Comment Re:Two wrongs do not make a right (Score 5, Interesting) 375

Advertisers and sites that depend on them don't want to admit that choosing to use a certain browser and allowing itts default settings *is* a choice. They are also free to request the user to turn DNT off before they serve up key features. They apparently *really* don't like the idea of having to explicitly ask, "can I follow you wherever you go after this"?

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...