Well that should work. PGP offers more of an illusion of security than most 
people realize. If someone knows whos email they want to read, and can find you 
online. All they have to do is hack into your computer, steal your keyfile, and 
install a keylogger to capture your password, and blam - no more encrypted 
email.
 Of course this is easier said than done, but still quite possible. To be 
totally safe you would have to use PGP on a computer that was not connected to 
a network. You could do this with your method.

On Thu, 12 Oct 2006 17:45:47 -0700
"Total Privacy" <[EMAIL PROTECTED]> wrote:

> 
> On Wed, 20 Sep 2006 18:43:41 +1000, "glymr" <[EMAIL PROTECTED]> said:
> > yes, port 25 is blocked by most tor exit nodes. however, some webmail
> > services (notably gmail) use different ports and are usable from tor.
> 
> How about this; 
> 
> Using PGP or similar to make an encrypted file (txt or word or something). 
> Then attach it to an ordinary webmail upload function, to send it over to 
> the recipient that alreday are informed of my public key (and who´s key I 
> have). All this whitout any need for Thunderbird or anything in computer. 
> 
> Anyboby tried this successfully? 
> 
> 
> 
> -- 
> http://www.fastmail.fm - The professional email service
> 
> 
> 


Reply via email to