EmailDiscussions.com  

Go Back   EmailDiscussions.com > Email Service Provider-specific Forums > FastMail Forum
Register FAQ Members List Calendar Today's Posts
Stay in touch wirelessly

FastMail Forum All posts relating to FastMail.FM should go here: suggestions, comments, requests for help, complaints, technical issues etc.

Reply
 
Thread Tools
Old 17 Apr 2016, 10:21 PM   #1
downthemall
Member
 
Join Date: Oct 2010
Posts: 65
Tor hidden service

Hello,

It would be nice to have a hidden service to access Fastmail
downthemall is offline   Reply With Quote

Old 18 Apr 2016, 09:24 PM   #2
ChinaLamb
The "e" in e-mail
 
Join Date: Dec 2004
Location: a virtually impossible but finitely improbable position
Posts: 2,320
Quote:
Originally Posted by downthemall View Post
Hello,

It would be nice to have a hidden service to access Fastmail
Fastmail provides very strong SSL connections to their servers -- follow the link and read completely:
https://www.fastmail.com/help/ourservice/security.html

If you are thinking that Tor adds any type of security, you are out of your mind, because it likely increases the scrutiny placed on you:
https://www.reddit.com/r/hacking/com...or_still_safe/
http://www.infosecurity-magazine.com...you-may-think/

My question is, what on earth are you doing that you have to hide you are using fastmail email? The email is secure. Read the first link. You want to hide that you are using Fastmail?

/cl
ChinaLamb is offline   Reply With Quote
Old 18 Apr 2016, 09:52 PM   #3
kijinbear
Cornerstone of the Community
 
Join Date: Mar 2011
Location: ~$
Posts: 652
As ChinaLamb said, every bit of information that you send to and receive from FastMail is already encrypted. So a hidden service would give you just as much security as accessing FastMail through regular Tor exit nodes. (The operator of the exit node will see that someone is using FastMail, but they will not know who it is, nor have access to any actual data you send to and receive from FastMail.)
kijinbear is offline   Reply With Quote
Old 19 Apr 2016, 05:30 AM   #4
downthemall
Member
 
Join Date: Oct 2010
Posts: 65
Quote:
Originally Posted by ChinaLamb View Post
You want to hide that you are using Fastmail?
Yes. Either hide or access FM when it's blocked here.
downthemall is offline   Reply With Quote
Old 19 Apr 2016, 05:34 AM   #5
ChinaLamb
The "e" in e-mail
 
Join Date: Dec 2004
Location: a virtually impossible but finitely improbable position
Posts: 2,320
Quote:
Originally Posted by downthemall View Post
Yes. Either hide or access FM when it's blocked here.
Use a vpn. Much safer in countries where websites are blocked. TOR brings up a ton of unnecessary scrutiny against yourself. I'd say stay away from TOR unless you want people to think you are doing something illegal.

But, it's your life.

/cl
ChinaLamb is offline   Reply With Quote
Old 19 Apr 2016, 06:09 AM   #6
downthemall
Member
 
Join Date: Oct 2010
Posts: 65
Quote:
Originally Posted by kijinbear View Post
As ChinaLamb said, every bit of information that you send to and receive from FastMail is already encrypted.
Is it? I was thinking about this today. What if a MTM attack goes on with a valid certificate? What if Google changes Chrome to accept a carefully crafted certificate when we access Fastmail? Is the Android Fastmail client hardcoded with the FM certificate?
downthemall is offline   Reply With Quote
Old 19 Apr 2016, 08:45 AM   #7
ChinaLamb
The "e" in e-mail
 
Join Date: Dec 2004
Location: a virtually impossible but finitely improbable position
Posts: 2,320
Quote:
Originally Posted by downthemall View Post
Is it? I was thinking about this today. What if a MTM attack goes on with a valid certificate? What if Google changes Chrome to accept a carefully crafted certificate when we access Fastmail? Is the Android Fastmail client hardcoded with the FM certificate?
Fake TOR exit points are much easier to spoof, than to sneak in a valid certificate to a browser like chrome. I have served in places needing high security for 16 years.

Many articles out there on this. TOR use in many countries is not to be trusted, because TOR cannot guarantee exit points. They weed the fake ones out *when they are found*.... *if they are found*... And if one is found, it means it was being used for a while before someone spotted it. Fake exit points are always one step ahead in that game... No way to guarantee...

Even if TOR were as secure as you seem to think it is, you still need a browser. TOR couldnt save you from faked certificates in Chrome.

Besides, If we see google changing chrome to fake certificates & steal your passwords, there will be a lot of class action lawsuits out there and Google will cease to be a company overnight.

The FastMail App has a hard wired certificate. It gives you a warning if someone tries to spoof. I know, someone tried to use fake certificates on me. The app warned me.

/cl
ChinaLamb is offline   Reply With Quote
Old 19 Apr 2016, 09:06 AM   #8
n5bb
Intergalactic Postmaster
 
Join Date: May 2004
Location: Irving, Texas
Posts: 8,929
FastMail has a smart group of developers who are on top of these things:
https://www.fastmail.com/help/ourservice/security.html

Also see:
https://blog.fastmail.com/2014/05/09...n-more-secure/
https://blog.fastmail.com/2015/03/13...-to-2048-bits/

Bill
n5bb is offline   Reply With Quote
Old 19 Apr 2016, 10:03 AM   #9
downthemall
Member
 
Join Date: Oct 2010
Posts: 65
Cool

Thank you, China Lamb!
downthemall is offline   Reply With Quote
Old 19 Apr 2016, 10:09 AM   #10
robn
Master of the @
 
Join Date: May 2012
Location: Melbourne, Australia
Posts: 1,007

Representative of:
Fastmail.fm
Quote:
Originally Posted by ChinaLamb View Post
The FastMail App has a hard wired certificate. It gives you a warning if someone tries to spoof. I know, someone tried to use fake certificates on me. The app warned me.
It's not hardwired; it performs exactly the same checks as your browser does - making sure there's a chain of trust back to the trusted certs on your device.
robn is offline   Reply With Quote
Old 19 Apr 2016, 10:12 AM   #11
ChinaLamb
The "e" in e-mail
 
Join Date: Dec 2004
Location: a virtually impossible but finitely improbable position
Posts: 2,320
Quote:
Originally Posted by robn View Post
It's not hardwired; it performs exactly the same checks as your browser does - making sure there's a chain of trust back to the trusted certs on your device.
My mistake!
ChinaLamb is offline   Reply With Quote
Old 19 Apr 2016, 11:33 AM   #12
downthemall
Member
 
Join Date: Oct 2010
Posts: 65
Quote:
Originally Posted by robn View Post
It's not hardwired; it performs exactly the same checks as your browser does - making sure there's a chain of trust back to the trusted certs on your device.
Not good. Please consider doing it.
downthemall is offline   Reply With Quote
Old 19 Apr 2016, 12:46 PM   #13
robn
Master of the @
 
Join Date: May 2012
Location: Melbourne, Australia
Posts: 1,007

Representative of:
Fastmail.fm
Quote:
Originally Posted by downthemall View Post
Not good. Please consider doing it.
It's no less secure than using the FM webapp from your mobile browser.

Adding public key pins and then getting those added to the Chromium and Firefox preload lists will happen this year. Probably sooner rather than later. It shouldn't be hard, but I need to focus - if I screw it up, I lock out everyone
robn is offline   Reply With Quote
Old 19 Apr 2016, 08:16 PM   #14
glass
Member
 
Join Date: Dec 2013
Posts: 54
Quote:
Originally Posted by ChinaLamb View Post
Fake TOR exit points are much easier to spoof, than to sneak in a valid certificate to a browser like chrome. I have served in places needing high security for 16 years.

Many articles out there on this. TOR use in many countries is not to be trusted, because TOR cannot guarantee exit points. They weed the fake ones out *when they are found*.... *if they are found*... And if one is found, it means it was being used for a while before someone spotted it. Fake exit points are always one step ahead in that game... No way to guarantee...

Even if TOR were as secure as you seem to think it is, you still need a browser. TOR couldnt save you from faked certificates in Chrome.

[...]

/cl
Everything you've said there is what the advantages of a hidden service is over normal use of Tor. Connections to hidden services don't use exit nodes as the traffic never leaves the network, and the .onion address (which is derived from the fingerprint) is what verifies a hidden service; they don't depend on CA certs (although some sites, eg. Facebook, choose to use TLS and CA certs on top of Tor's encryption).
glass is offline   Reply With Quote
Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is Off
HTML code is Off
Forum Jump


All times are GMT +9. The time now is 09:40 AM.

 

Copyright EmailDiscussions.com 1998-2022. All Rights Reserved. Privacy Policy