So that design would work: http://smallsister.org/show_image.php?id=5
On Sun, Nov 9, 2008 at 10:54 PM, <[EMAIL PROTECTED]> wrote: > Hi, > > yes, i started my TOR exit node with port 25 open (default is close) > and half a year later my provide sent me a letter that my PC is > sending many spam mails permanent and that i should check my PC > for malware. > Because i could not find an email relay i could forward the mails to, > i closed port 25. > > So TOR is in use as an email mixmaster. > > Regards, > > Rolf > > > > > Hi > > > > want to know, if tor is as well an email mixmaster, > > e.g. we have an email client, which is sending only pgp encrypted > > emails, > > then the ISP is excluded as he cannot read, but data retention laws > > allow to log the IP from where the email is sent and the email server > > knows the last exit point of the encrypted package (email). > > If now in this email client an onion routing system would be enabled, > > then all email (enc. Packages) would be routed, and some exit nodes > > would deliver them. > > Is this already possible with Tor? Are there enough exit nodes? would > > it be possible and useful for email services to force every node to > > be an exit node for encry. packets to email accounts? how much > > bandwidth is a node requiring then for mixing/forwarding emails only? > > are there developers working on that? or interested? > > > > > > Regards > > >