1 00:00:01,390 --> 00:00:07,000 In this video I want to cover the last type of email providers. 2 00:00:07,210 --> 00:00:13,180 So as we're going through these videos the providers will become a little bit harder to use and will 3 00:00:13,180 --> 00:00:20,230 have less features but they will become more private more secure and therefore more anonymous. 4 00:00:21,400 --> 00:00:29,480 So in the previous lecture we had the look on privacy focused email providers such as proton mail. 5 00:00:29,650 --> 00:00:35,770 They were great as they don't track you they keep no logs they use encryption and all that good stuff. 6 00:00:35,770 --> 00:00:41,850 The only problem with them is that they operate both on the clear and on the darknet. 7 00:00:42,010 --> 00:00:49,570 They are proper known companies and therefore sometimes they comply with court orders and might be influenced 8 00:00:49,570 --> 00:00:51,720 by agencies and so on. 9 00:00:53,140 --> 00:00:58,870 Now the email providers that I want to show you in this lecture they come with all of these great features 10 00:00:58,930 --> 00:01:01,210 of the privacy focused mail providers. 11 00:01:01,210 --> 00:01:08,320 So they come with no tracking no logs require no personal information and all that and they operate 12 00:01:08,320 --> 00:01:13,130 fully from the darknet so they don't have servers on the kitchenette. 13 00:01:13,180 --> 00:01:18,370 And even if they have clear net Web sites they redirect you to the darknet Web site. 14 00:01:18,490 --> 00:01:25,320 They're less likely to be influenced by agencies and so on because all of their servers are in the darknet. 15 00:01:25,330 --> 00:01:28,540 So all of them are running as online services. 16 00:01:28,570 --> 00:01:37,060 Therefore by default the benefit from Tours anonymous housing and privacy features they all use encryption 17 00:01:37,390 --> 00:01:42,910 and therefore they are more secure more private and therefore they are more anonymous. 18 00:01:44,410 --> 00:01:47,490 Now there are a lot of darknet email providers. 19 00:01:47,530 --> 00:01:50,960 I'll include links to lists in the resources of this lecture. 20 00:01:51,010 --> 00:01:53,950 You can go through them and see which one you like the most. 21 00:01:53,950 --> 00:02:00,940 As usual do your own research read the privacy policy and pick the one you like the most in this lecture 22 00:02:00,940 --> 00:02:01,330 though. 23 00:02:01,420 --> 00:02:05,270 I'm going to show you two examples of these male providers. 24 00:02:05,290 --> 00:02:07,490 The first one is allowed. 25 00:02:07,570 --> 00:02:08,830 It's pretty cool. 26 00:02:08,830 --> 00:02:12,620 Like I said KIPP's no trike no logging all that cool stuff. 27 00:02:12,700 --> 00:02:20,260 It also uses end to end encryption and your emails are stored in personally encrypted storage so that's 28 00:02:20,260 --> 00:02:22,030 really really nice. 29 00:02:22,030 --> 00:02:29,250 Now before I go and use this both of the services that I'm going to show you today do not require javascript. 30 00:02:29,560 --> 00:02:38,720 Therefore we can go ahead and set our security settings to the highest we had to keep it at safer when 31 00:02:38,720 --> 00:02:45,270 we were using proton mail because it requires javascript but for both of the services that we're going 32 00:02:45,270 --> 00:02:48,100 to use today they do not require javascript. 33 00:02:48,200 --> 00:02:54,560 Therefore we can set our security to the highest and they should still work and function as expected 34 00:02:55,740 --> 00:02:57,960 signing up to this is very simple. 35 00:02:57,980 --> 00:03:02,900 All you have to do is go to sign up now like I said I will include a link to this in the resources of 36 00:03:02,900 --> 00:03:05,080 the lectures so don't worry about that. 37 00:03:05,290 --> 00:03:07,340 It's going to ask you for your name again. 38 00:03:07,370 --> 00:03:09,380 Use your fake identity. 39 00:03:09,380 --> 00:03:15,160 So I'm going to set it to John Wick put a user name so I'm going to set it to J. 40 00:03:15,160 --> 00:03:27,070 N w k seven set a password so the capture and click on register so it doesn't get any simpler than this. 41 00:03:27,820 --> 00:03:30,100 When you're done it's telling us we succeeded. 42 00:03:30,100 --> 00:03:33,780 We have the email now and we can just go ahead and log in. 43 00:03:34,060 --> 00:03:43,040 So I'm gonna log in with my username put my password fill the captcha now it's going to ask you to verify 44 00:03:43,040 --> 00:03:43,950 your email. 45 00:03:44,030 --> 00:03:48,020 You can do this using any of the other services that I covered before. 46 00:03:48,020 --> 00:03:52,830 Or you can just keep the verification and go straight to your account. 47 00:03:52,880 --> 00:03:59,300 Now that I'm in my account I'm gonna go to the email log in to go to my inbox and I'm going to use the 48 00:03:59,300 --> 00:04:01,070 text only interface 49 00:04:03,970 --> 00:04:05,280 and perfect as you can see. 50 00:04:05,290 --> 00:04:08,530 You get a normal inbox that is very easy to use. 51 00:04:08,620 --> 00:04:14,380 So I'm not going to spend too much time on it but I want to highlight a major feature of this email 52 00:04:14,380 --> 00:04:15,560 provider. 53 00:04:15,670 --> 00:04:22,660 See when it comes to darknet email providers not all of them allow you to send emails to darknet and 54 00:04:22,660 --> 00:04:29,320 clear Net addresses so the loot is one of these email providers which allow you to communicate with 55 00:04:29,320 --> 00:04:32,630 both clear net and darknet addresses. 56 00:04:33,040 --> 00:04:39,490 So as a test let me first of all send an email to a clear net address to a Gmail address. 57 00:04:39,550 --> 00:04:42,400 So this is my other G.M. account. 58 00:04:42,520 --> 00:04:47,860 Now you should never do this in real life scenarios you should never communicate with your own clear 59 00:04:47,860 --> 00:04:52,640 net addresses because this can be used to link you and to know who you are. 60 00:04:52,720 --> 00:04:59,440 But for now I'm just trying to show you that this email provider works with both clear net and darknet 61 00:04:59,470 --> 00:05:09,270 addresses so I'm just gonna say this is a test to clear that e-mail address. 62 00:05:09,500 --> 00:05:14,480 You can also send attachments if you want but we're going to keep this the way it is. 63 00:05:14,510 --> 00:05:22,080 I'm going to send it and if I go to my email address that I sent this to as you can see we got the message. 64 00:05:22,080 --> 00:05:25,490 It's telling us that this is a test to a clear net address. 65 00:05:25,610 --> 00:05:26,300 I can reply. 66 00:05:26,300 --> 00:05:32,660 Let's just say it works and if we go back here go to the inbox. 67 00:05:34,230 --> 00:05:35,430 Refresh it. 68 00:05:35,430 --> 00:05:36,840 Perfect as you can see. 69 00:05:36,900 --> 00:05:42,480 We get the response if we click on that it saying it works. 70 00:05:42,530 --> 00:05:48,900 So everything is working as expected and we can use this account to send e-mails to both clear net and 71 00:05:48,950 --> 00:05:51,290 darknet addresses. 72 00:05:51,290 --> 00:05:55,220 Now this is one example of darknet e-mail providers. 73 00:05:55,220 --> 00:05:59,170 The other example that I want to show you is called Tor box. 74 00:05:59,180 --> 00:06:05,150 Like I said I will include links to this in the resources and the main difference between tor box and 75 00:06:05,240 --> 00:06:11,310 elude is that Tor Books is completely isolated from the clear net. 76 00:06:11,330 --> 00:06:17,390 This makes it a little bit more private because it literally prevents you from communicating with anyone 77 00:06:17,450 --> 00:06:18,640 on the clear net. 78 00:06:18,630 --> 00:06:23,840 Therefore increasing your privacy and therefore increasing your anonymity. 79 00:06:23,840 --> 00:06:29,390 Also like I said The more examples that I show you the less features they will have and the more anonymous 80 00:06:29,390 --> 00:06:30,080 they are. 81 00:06:30,080 --> 00:06:34,160 So this email provider has less features and you'll see that. 82 00:06:34,160 --> 00:06:37,490 But like I said it will be more private and more anonymous. 83 00:06:38,420 --> 00:06:42,780 So let's click on sign up to sign up and you'll see this is again very very simple. 84 00:06:43,880 --> 00:06:44,710 We'll set a name. 85 00:06:44,720 --> 00:06:48,110 So again John Wick pick an email. 86 00:06:48,120 --> 00:06:57,180 So our e-mail is going to be edgy and the bill you k 7 and it'll be at this address that onion. 87 00:06:57,180 --> 00:07:04,560 And we're going to set a password and solve the captcha and perfect the e-mail is done. 88 00:07:04,560 --> 00:07:05,150 This is it. 89 00:07:05,160 --> 00:07:08,130 You can store it in a text file so you can remember it. 90 00:07:08,190 --> 00:07:18,130 And now we can go ahead click on web mail log in to log in put the name and the password and perfect. 91 00:07:18,130 --> 00:07:23,200 We're logged in right now as you can see the interface is even simpler in here. 92 00:07:23,200 --> 00:07:27,250 If you wanted to write a message you can click on compose. 93 00:07:27,250 --> 00:07:28,000 Let me show you. 94 00:07:28,000 --> 00:07:31,000 If I sent this to my G.M. email address 95 00:07:33,730 --> 00:07:40,650 and say test and click on send you'll see that this will actually be refused. 96 00:07:40,660 --> 00:07:46,710 So as you can see it's telling us that this did not get sent because we are trying to communicate with 97 00:07:46,710 --> 00:07:49,110 a clear net email address. 98 00:07:49,120 --> 00:07:52,570 However if I tried to send something here to the fluid e-mail. 99 00:07:52,870 --> 00:08:02,290 So this was G and C K 7 at elude dot and keep everything the same. 100 00:08:02,290 --> 00:08:07,230 If I click on send you'll see I'll get no error messages. 101 00:08:07,340 --> 00:08:17,220 And if I go to elude and check my inbox you can see I have a message coming from my tor box address. 102 00:08:17,320 --> 00:08:25,750 And if we go away we can see the message content now elude and Tor Books are just two examples of darknet 103 00:08:25,810 --> 00:08:26,800 e-mail providers. 104 00:08:26,800 --> 00:08:33,610 Like I said I just wanted to show you two different examples as like I said elude allows you to communicate 105 00:08:33,610 --> 00:08:41,590 with both clear net and darknet addresses where Tor Books can only communicate with darknet addresses. 106 00:08:41,590 --> 00:08:48,340 So again do your own research read about both of them see which one suits you best and fits your threat 107 00:08:48,340 --> 00:08:52,380 model and fits your needs and use the one that is best for you. 108 00:08:52,390 --> 00:08:57,610 And like I said I'll include links to all of these and more in the resources of this lecture.