In addition, you will need to check for DNS leaks, since the e-mail client will do a MX host lookup for each recipient's e-mail domain.
Elysius On 11/15/13 02:18, Missouri Anglers wrote: > I suppose the best way to test this is to send myself an email using "simple > Mail" and then run the headers through something like SPAMCOP.NET and see if > there is a trace of my ip address/ISP found. > I am not really tech enough to go much beyond that. > Is there something else I can do to test this? > > > On Thu, 14 Nov 2013 19:22:47 -0600 > Joe Btfsplk <joebtfs...@gmx.com> wrote: > >> >> On 11/14/2013 5:27 PM, Missouri Anglers wrote: >>> Has the security of "Simple Mail" been discussed yet? >>> If so, can someone tell me where I can find the past discussions? >>> >>> If not, Simple Mail is a mail client add on for Firefox. It allows you to >>> get notified, read and write messages for multiple email accounts "inside" >>> Firefox. Does it maintain the privacy associated with the TOR Firefox >>> browser? >> Maybe others have direct experience w/ it. The general problem w/ many >> extensions, plugins, even clients - is they don't "follow the rules" of >> staying w/in the Tor network AND not revealing data that may leak your >> identity / location. >> It's a case by case basis, but for Tor, most don't use extensions / >> plugins - for email - like you're talking. They're not developed w/ >> extreme anonymity in mind. Not that they don't work for general, non >> anonymous use. >> >> You want what everyone does - ultimate convenience & high anonymity. >> They rarely exist together. >> >> You can search the archives of Tor-talk for previous discussions. >> -- >> tor-talk mailing list - tor-talk@lists.torproject.org >> To unsubscribe or change other settings go to >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk