[tor-talk] Using non U.S. email providers_ allows 'legal' data gathering?
Joe Btfsplk
joebtfsplk at gmx.com
Wed Oct 16 15:49:59 UTC 2013
> ========================================================================
> Tor Weekly News October 16th, 2013
> ========================================================================
>
> [9] https://labs.riseup.net/code/issues/5421
>
The reference to risup.net in Tor Weekly News isn't in context for this,
but raises a question.
I've not read a lot on the 'LEAs' gathering data - even email address
books? (assume getting them from web mail?), but several articles I did
read indicated one of the ways "LEAs" got around U.S. illegalities of
spying on citizens that weren't under suspect, is "grab" data from
servers OUTSIDE the U.S.
DON'T know how large a % of all data gathered is by this method -
servers outside U.S.
If the articles are accurate, if worried about snooping, is it smarter /
dumber / makes no difference, to use one of the many "more private /
secure" providers, often located outside the U.S. (like Riseup.net), or
just use one in the U.S.?
Of course, the shut down of Lavabit because of demand for access to all
users' accounts doesn't instill confidence in having a U.S. based acct.,
but there was one user among them on the "(Top) most wanted list." They
wanted to make sure no stone was unturned.
1) Articles indicated LEAs could 'legally' capture data when mail is
sent from U.S. to foreign recipient / server (the LEAs aren't limited by
laws / constitution in other countries, or don't care).
2) Could capture data if U.S. citizens had email accts in foreign countries.
3) Could capture data originating in the U.S., routed though foreign
servers, before final delivery to another U.S. server.
4) Could capture data originating from foreign servers, destined for
U.S. servers.
Or... it may not matter what you do, or where, if not encrypting your email?
More information about the tor-talk
mailing list