Misplaced Pages

SIGAINT: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 17:55, 25 September 2016 editDeku-shrub (talk | contribs)Extended confirmed users8,540 editsNo edit summary← Previous edit Revision as of 17:55, 25 September 2016 edit undoDeku-shrub (talk | contribs)Extended confirmed users8,540 edits External linksTag: nowiki addedNext edit →
Line 35: Line 35:
== External links == == External links ==
* {{official|https://www.sigaint.org/}} * {{official|https://www.sigaint.org/}}
* <nowiki>http://sigaintevyh2rzvw.onion</nowiki>


== References == == References ==

Revision as of 17:55, 25 September 2016

SIGAINT
Type of siteWebmail, E-Mail service
Available inEnglish
URLsigaint.org, sigaintevyh2rzvw.onion
CommercialNo
RegistrationRequired
Usersabout 42000
Current statusOnline

SIGAINT is a Tor hidden service offering secure email services. According to its FAQ page, its web interface uses SquirrelMail which does not rely on JavaScript. Passwords cannot be recovered. Users receive two addresses per inbox: one at sigaint.org for receiving clearnet emails and the other at its .onion address only for receiving emails sent from other Tor-enabled email services. Free accounts have 50 MB of storage space and expire after one year of inactivity. Upgraded accounts have access to POP3, IMAP, SMTP, larger size limits, full disk encryption, and never expire.

The service is recommended by various security specialists as a highly secure email service.

In April 2015 a number of user accounts were compromised in what was speculated at the time was a government-sponsored deanonymization attack from 70 different exit nodes. A SIGAINT administrator said that the hidden service was not hacked but malicious exit nodes had modified their clearnet page so that its link to the hidden service pointed to an imposter hidden service, effectively tricking users with a phishing attack that harvesting login credentials. SIGAINT has since added SSL to their gateway to protect against such attacks.

See also

External links

References

  1. ^ SIGAINT Admin. "SIGAINT email service targeted by 70 bad exit nodes". tor-talk. Tor Project. Retrieved 2016-08-31.
  2. Pauli, Darren (4 May 2016). "How to evade the NSA: OpSec guide for journalists also used by terrorists". Retrieved 26 May 2016.
  3. Maria, Korolov (13 May 2016). "Terrorists opt for consumer tools". Retrieved 26 May 2016.
  4. DeepDotWeb (16 February 2015). "Interview With "Sigaint DarkNet Email" Admin". Retrieved 26 May 2016.
  5. Paganini, Pierluigi (26 April 2015). "Dark Web Email Service SIGAINT hacked by the Intelligence". Retrieved 26 May 2016.
  6. Franceschi-Bicchierai, Lorenzo (24 April 2015). "After Hacks, A Dark Web Email Provider Says a Government Spied on Its Users". Retrieved 25 September 2016.
  7. SIGAINT. "SIGAINT Incidents Report". Retrieved 25 September 2016.
Tor onion services
Search engines
News
File storage and peer-to-peer
file sharing
Email and
instant messaging
Social media and forums
Financial
Darknet markets
Document archives
Nonprofit organizations
Operating systems
Government
Whistleblowing
Pornography
Other
Sites in italics are now offline or discontinued (not counting ambiguously forked sites).


Stub icon

This computing article is a stub. You can help Misplaced Pages by expanding it.

Categories: