1 00:00:00,850 --> 00:00:08,230 The next type of e-mail services that I want to talk about are e-mail services that are focused on privacy 2 00:00:08,230 --> 00:00:10,150 and anonymity. 3 00:00:10,150 --> 00:00:16,660 So unlike temporary e-mails these are proper e-mail services that will give you a proper e-mail your 4 00:00:16,660 --> 00:00:18,580 inbox will never expire. 5 00:00:18,580 --> 00:00:25,420 You will sign up and log in with a password similar to the way you sign up and logon to the e-mail services 6 00:00:25,420 --> 00:00:26,600 that you're familiar with. 7 00:00:26,620 --> 00:00:33,340 Similar to Google and Hotmail they offer a lot of very useful features their user friendly. 8 00:00:33,820 --> 00:00:37,750 So again all of this is similar to the services you're used to. 9 00:00:37,750 --> 00:00:45,820 But unlike Gmail and Hotmail and all of these services that collect a lot of data about you these privacy 10 00:00:45,820 --> 00:00:52,390 focused e-mail services collect no data they don't store any logs they don't track you. 11 00:00:52,750 --> 00:00:55,840 Most of them use some sort of encryption. 12 00:00:55,870 --> 00:00:59,230 The good ones would be used in end to end encryption. 13 00:00:59,230 --> 00:01:06,700 So your e-mail will be encrypted at your end and only decrypted at the destination therefore nobody 14 00:01:06,700 --> 00:01:09,880 that intercepts this e-mail will be able to read it. 15 00:01:10,120 --> 00:01:14,570 Even the mail provider itself shouldn't be able to read it. 16 00:01:14,770 --> 00:01:22,270 Now I actually look at these services as a hybrid between the e-mail services that we all know and use 17 00:01:22,360 --> 00:01:29,530 such as Gmail and the e-mail services available on the darknet that I will talk about in the next lectures 18 00:01:29,830 --> 00:01:34,660 because like I said first of all they offer all of the features that we are used to. 19 00:01:34,930 --> 00:01:40,360 They are also user friendly but at the same time they won't track you. 20 00:01:40,360 --> 00:01:43,900 They won't keep any logs and their privacy focused. 21 00:01:43,900 --> 00:01:49,330 And another reason that makes me feel that they are like a hybrid is the fact that most of them are 22 00:01:49,330 --> 00:01:53,710 available on the clear net and on the darknet. 23 00:01:53,710 --> 00:02:00,610 So they'd have a clear Net address and a Dark Net address and they can communicate with both darknet 24 00:02:00,700 --> 00:02:05,350 and clear net email providers similar to the temporary e-mails. 25 00:02:05,350 --> 00:02:11,920 There are a number of providers that offer these services I highly encourage you to do your own research 26 00:02:12,190 --> 00:02:18,550 and read the privacy policy before you sign up with any of them and never use your real identity if 27 00:02:18,550 --> 00:02:21,270 you're using these services in the darknet. 28 00:02:21,280 --> 00:02:24,760 Make sure you use your fake identity. 29 00:02:24,760 --> 00:02:29,930 With that being said a very popular example is proton mail. 30 00:02:30,160 --> 00:02:34,630 So this is just an example of a privacy focused e-mail provider. 31 00:02:34,630 --> 00:02:36,030 It is not the only one. 32 00:02:36,040 --> 00:02:42,220 And like I said I highly encourage you to do your own research and read and see which is best for you. 33 00:02:43,030 --> 00:02:48,610 So proton mail comes with all of the features that I just mentioned that all of the providers in this 34 00:02:48,610 --> 00:02:52,880 category offer on top of that it is open source. 35 00:02:53,020 --> 00:02:59,830 So all of the code used is available for anyone to read and analyze and even if you don't know coding 36 00:03:00,100 --> 00:03:06,700 you can be rest assured that people are constantly revising their code and will call them out if they 37 00:03:06,700 --> 00:03:09,090 discover anything fishy. 38 00:03:09,640 --> 00:03:16,810 Proton mail also enforces hasty G.P.S. on both on their clear net and on their darknet website which 39 00:03:16,810 --> 00:03:20,190 is something that is rare on DarkNet websites. 40 00:03:20,200 --> 00:03:23,940 And it is great because that adds an extra layer of encryption. 41 00:03:24,010 --> 00:03:25,780 It uses end to end encryption. 42 00:03:25,780 --> 00:03:32,440 So like I said the messages that you send get encrypted at your end and only decrypted at the destination 43 00:03:32,620 --> 00:03:33,700 and vice versa. 44 00:03:33,700 --> 00:03:39,310 So even proton mail if they wanted to read the content of your e-mail they won't be able to do that 45 00:03:39,490 --> 00:03:42,290 because it's going to be encrypted. 46 00:03:42,430 --> 00:03:48,790 They also use their own servers so they don't rent servers from third parties and all of their servers 47 00:03:48,850 --> 00:03:56,930 are in Switzerland which is a country known for having good privacy laws with that being said if you 48 00:03:56,930 --> 00:04:03,290 read their privacy policy and their transparency page you will see that they did reveal information 49 00:04:03,380 --> 00:04:08,780 about specific users in order to comply with court orders. 50 00:04:08,960 --> 00:04:11,150 But like I said they keep no logs. 51 00:04:11,150 --> 00:04:17,240 They don't track you and everything is encrypted so they don't have a lot of information anyway even 52 00:04:17,240 --> 00:04:19,970 if they do reveal this information. 53 00:04:19,970 --> 00:04:25,550 And at the end of the day like I said at the start of the section I'm showing you all of the options 54 00:04:25,790 --> 00:04:31,940 and you should go with what suits you best in terms of why you need this account and what's your threat 55 00:04:31,940 --> 00:04:33,370 model. 56 00:04:33,560 --> 00:04:36,890 Now let's go ahead and have a look on this Web site. 57 00:04:36,920 --> 00:04:39,460 So right here I have their clear net Web site. 58 00:04:39,590 --> 00:04:44,360 And in here I have their onion head in service for this to work. 59 00:04:44,360 --> 00:04:51,950 You should actually put your security settings to medium to safer so that it allows javascript to be 60 00:04:51,950 --> 00:04:54,830 executed on hash TTP pages. 61 00:04:54,860 --> 00:05:01,190 Now dependent on your threat model you might not want to do this but in general because this is only 62 00:05:01,190 --> 00:05:08,240 done on TTP pages which already has encryption and because proton mail is open source so all of its 63 00:05:08,240 --> 00:05:09,340 code is known. 64 00:05:09,470 --> 00:05:16,270 And because of their reputation it's not a very bad idea to do this now. 65 00:05:16,280 --> 00:05:17,750 Signing up is very simple. 66 00:05:17,750 --> 00:05:20,530 All you have to do is just click on sign up. 67 00:05:20,600 --> 00:05:30,330 I'm going to choose the free account and I'm going to selected and let's set up a user name so like 68 00:05:30,330 --> 00:05:34,860 I said you want to keep in mind that you are going to use your fake identity in here. 69 00:05:35,370 --> 00:05:42,240 So I'm just going to set this to g o w c k and let's put a password. 70 00:05:42,460 --> 00:05:47,320 You can also set a recovery e-mail that you can use to recover the password with. 71 00:05:47,320 --> 00:05:52,810 I'm going to keep this to blank because I don't want to give a lot of information about myself and I'm 72 00:05:52,810 --> 00:05:55,640 going to click on Create Account. 73 00:05:55,810 --> 00:06:00,390 It's given me a warning that I'm creating an account without a recovery e-mail. 74 00:06:00,400 --> 00:06:08,310 But that's fine and right now proton mail is going to create the keys that will be used to encrypt your 75 00:06:08,310 --> 00:06:09,690 data your e-mails. 76 00:06:09,720 --> 00:06:12,360 Like I said it uses end to end encryption. 77 00:06:12,360 --> 00:06:19,530 So when you send something it gets encrypted at your end and it will only be decrypted at the destination. 78 00:06:19,530 --> 00:06:26,250 Therefore anyone in the middle including proton mail themselves they won't be able to see the contents 79 00:06:26,310 --> 00:06:28,060 of your emails. 80 00:06:28,350 --> 00:06:31,640 Now you want to give this some time because it could take a few minutes. 81 00:06:31,650 --> 00:06:35,700 Dependent on the specs of your computer. 82 00:06:36,160 --> 00:06:36,600 OK. 83 00:06:36,600 --> 00:06:38,730 Now it's asking me to solve this capture. 84 00:06:38,880 --> 00:06:41,250 So I'm going to click I'm not a robot. 85 00:06:41,250 --> 00:06:45,600 It's not accepting this probably because I'm using the Tor network. 86 00:06:45,690 --> 00:06:51,590 So the other solution would be to verify myself that I'm not a robot using an e-mail. 87 00:06:51,690 --> 00:06:58,740 And again you can use any email in here I'm going to use a temporary e-mail similar to the ones I showed 88 00:06:58,740 --> 00:07:00,390 you in the previous lectures. 89 00:07:00,540 --> 00:07:05,850 So I'm just gonna go to guerilla mail dot com. 90 00:07:06,030 --> 00:07:11,040 Let's just use a different domain just in case there they get a lot of domains like this one 91 00:07:14,620 --> 00:07:24,440 and that's copy this and paste it here and we're going to send so it's telling us that the verification 92 00:07:24,440 --> 00:07:27,810 code should be sent to the email that we picked. 93 00:07:27,830 --> 00:07:33,350 Let's go back and check if we actually did get this verification code perfect. 94 00:07:33,390 --> 00:07:35,470 As you can see we have the code in here. 95 00:07:35,700 --> 00:07:38,680 It's 9 7 4 6 4 4. 96 00:07:38,790 --> 00:07:45,780 So go by Keir and we're going to click on complete setup. 97 00:07:46,010 --> 00:07:52,760 Again you want to be patient with this and let it load and create your account and perfect as you can 98 00:07:52,760 --> 00:07:54,710 see the account should be set up. 99 00:07:54,710 --> 00:08:02,220 Now it's asking us if we want to change the name I'm going to keep it the way it is going to close these 100 00:08:02,220 --> 00:08:08,440 tips aren't perfect as you can see it's a very nice user interface. 101 00:08:08,440 --> 00:08:15,840 Like I said this really is like a hybrid between what you get on the clear net and on the darknet using 102 00:08:15,850 --> 00:08:17,110 this is very intuitive. 103 00:08:17,110 --> 00:08:19,300 I'm not going to waste more time on it. 104 00:08:19,300 --> 00:08:22,370 This is your inbox draft sent and so on. 105 00:08:22,450 --> 00:08:24,960 You click on composed to send a message. 106 00:08:25,210 --> 00:08:31,480 The messages that you get will show up in here in the inbox and you can from any message you can click 107 00:08:31,480 --> 00:08:32,050 on it. 108 00:08:32,110 --> 00:08:37,880 And now that you're inside the message you can reply forward and so on. 109 00:08:38,090 --> 00:08:39,860 So that's it for this lecture. 110 00:08:39,860 --> 00:08:45,800 Just wanted to cover an example of a private kind of hybrid e-mail service. 111 00:08:45,890 --> 00:08:48,090 Like I said this is not the only one. 112 00:08:48,110 --> 00:08:51,010 So please don't take this as the only example. 113 00:08:51,020 --> 00:08:52,540 This is just an example. 114 00:08:52,640 --> 00:08:54,950 And I want you to understand the whole concept. 115 00:08:54,950 --> 00:09:00,910 So there is a whole number of services that operate on the same concept. 116 00:09:01,010 --> 00:09:05,540 Like I said there are a lot of pros to this as you can see in here. 117 00:09:05,720 --> 00:09:12,790 The only cons are the fact that it uses javascript and the fact that it is a clear net Web site. 118 00:09:12,840 --> 00:09:19,640 It is a proper company and they have complied and revealed information about their users when the court 119 00:09:19,730 --> 00:09:21,800 ordered them to do so. 120 00:09:22,040 --> 00:09:25,310 With that being said like I said they don't keep any logs. 121 00:09:25,310 --> 00:09:31,070 They don't track you and everything is encrypted so they can't really reveal too much because they don't 122 00:09:31,070 --> 00:09:32,870 know too much. 123 00:09:32,870 --> 00:09:38,510 But again read the privacy policy continue with the options that I'm going to show you and pick the 124 00:09:38,510 --> 00:09:45,260 option that works best for you based on the reason why you need this service and based on your threat 125 00:09:45,260 --> 00:09:45,710 model.