Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome.org cryptome.info jya.com eyeball-series.org cryptome.cn


29 December 2007

Related: The NSA-Crypto AG Sting

Date: Sat, 29 Dec 2007 12:19:11 -0800
To: <cryptome[at]earthlink.net>
Subject: Re: NSA Controls SSL Email Hosting Services
From: "Hushmail" <contact[at]hushmail.com>

Regarding your post: NSA Controls SSL Email Hosting Services on
December 19, 2007 at http://cryptome.info/0001/nsa-ssl-email.htm

Hush Communications Corporation, the company that provides the
Hushmail.com email service, is not owned, wholly or in part, by any
government agency.

Furthermore, server access is not granted to any party other than
the company's own authorized staff.

Regards,
Team Hush

24 December 2007

Date: Mon, 24 Dec 2007 17:19:06 +0200
From: "Safe-mail support" <Support[at]Safe-mail.net>

Hello,

Regarding your recent post: NSA Controls SSL Email Hosting Services on December
19, 2007 at http://cryptome.org/nsa-ssl-email.htm

Please notice that:

1. We never had any contacts, direct or indirect, with the NSA or any other
government agency anywhere in the world.

2. All software we use is in-house development.

3. We have never shared our technology with any other party.

Best Regards,

Safe-mail.net Team

21 December 2007:

Date: Thu, 20 Dec 2007 14:43:55 -0600
From: Guardster Support <support[at]guardster.com>
To: cryptome[at]earthlink.net
Subject: Cryptome. Re: NSA Controls SSL Email Hosting Services, Dec 19, 2007

Regarding your recent post: NSA Controls SSL Email Hosting Services on December 19, 2007 at http://cryptome.info/0001/nsa-ssl-email.htm:

We can assure you that we do not cooperate with the NSA or any other government agency anywhere in the world. We invite whomever is making this statement to provide proof, rather than making a baseless accusation. With the same level of proof we can confidently state that whomever is saying this is an alien from Mars. The poster appears on the surface to be some type of conspiracy theorist and should be interpreted as such.

The Guardster Team

19 December 2007


A sends:

Subject: NSA-affiliated IPs/DNS as of 19 Dec 2007 05:57hrsGMT
Date: Tue, 18 Dec 2007 23:40:38 -0700 (MST)

Just learned following within the past few days:

Certain privacy/full session SSL email hosting services have been purchased/changed operational control by NSA and affiliates within the past few months, through private intermediary entities.

Hushmail: now fully owned by private entity NSA affiliate; has had informal relationship with NSA for a number of years that effectively provided NSA with real time access to Hushmail's hosting servers.

Safe-mail.net: Israeli-based, ironically privately lauded by NSA and US military several years ago for its sound implementation of SendMail with SSL webmail GUI frontend. Now provides mail server info to NSA in real time.

Guardster.com (SSH/SSL proxy): NSA contractors have "bought" full access rights to Guardster servers a few days ago. Separate but related: faciliated port sniffing of hosting servers at Everyones Internet, on NSA affiliates' behalf, has been ongoing for a number of months now.

More info on industry Windows security software:

Zone Alarm, Symantec, MacAfee: All facilitate Microsoft's NSA-controlled remote admin access via IP/TCP ports 1024 through 1030; ie will allow access without security flag. Unknown whether or not software port forward routing by these same programs will defeat NSA access.

I will continue to provide more info on the above and related topics upon discovery.