How to create and maintain anonymous email accounts

Don’t let what happened to the director (actually, former director) of a very powerful government agency make you think that engaging in anonymous email activities is impossible. It is, though, as with all things involving digital security, it can never be 100%.

But that should not keep you from trying to keep your email communications private and anonymous, because if you take the proper steps, you can create and maintain anonymous email accounts that will be almost impossible to trace back to you.

The steps you need to take are:

Download The Tor Browser Bundle: – You should use the Tor Browser Bundle when setting up and accessing your webmail account. You must always use Tor. If you mess up just once and log into the pseudonymous account from your real IP address, chances are that your webmail provider will keep linkable records about you forever. You will also need to ensure that you do not give your webmail provider any information that is linked to your real world identity. For instance, if prompted for an email account, do not use another real account during signup; use a throwaway address instead.

After that:

Set Up A Webmail Account: – Now that you have your Tor Browser up and running, use it to set up a new webmail account, ideally with a provider that you do not otherwise use. Using a separate webmail provider will help you to distinguish between your anonymous account and your regular email account.

And finally:

Use end-to-end encryption with your pseudonymous email account:.

Read the complete article here.

Related Posts

Boot managers and boot devices on a PC with UEFI firmware UEFI firmware technology may have its positive aspects, but it also comes, like everything else, with its not-so positive aspects. It is not-so positi...
Police considers moving to open source The Polish Police force wants to increase its use of free and open source software in order to cut costs, announces Andrzej Trela, Deputy Chief of Pol...
Apache OpenOffice: Help pick a new logo The release of Apache OpenOffice 4 will not happen tomorrow, but it is getting close. How close? Well, let's just say it will happen soon. In months t...
German govt comes out against Trusted Computing and Secure Boot Trusted Computing and Secure Boot, especially Secure Boot, are supposed to boost the security of devices that you own. Yes, devices that you own! Howe...
ZeroDB, a end-to-end encrypted database, is now open source ZeroDB is a new database application with a very cool feature. At a time when security is foremost in the minds of most people in this digital age,...
Why the GPL Sinks SCO’s Copyright Infringement Claims, Even if it Owned the Copyrigh... Editor's note: This is a very long, but informative article. It's worth the read. If you are new to the Free Software community, you need to have some...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


2 Comments

  1. You can also use tormail.org for extra security!

  2. Pingback: Links 2/12/2012: IndieCity Coming to GNU/Linux, CIA Spy Network Grows | Techrights

Leave a Comment

Your email address will not be published. Required fields are marked *

*