1 00:00:01,290 --> 00:00:06,360 As mentioned in the previous lecture and this lecture and in the next lectures I'm going to show you 2 00:00:06,360 --> 00:00:09,890 a number of methods to send and receive emails. 3 00:00:10,110 --> 00:00:17,370 And then you can sit down yourself compare them and see which wants you to best based on the reason 4 00:00:17,370 --> 00:00:23,660 why you need an email address and based on your threat model. 5 00:00:23,780 --> 00:00:29,340 Now the first thing that I want to cover is temporary email accounts as the name suggests. 6 00:00:29,360 --> 00:00:36,300 These are email accounts that will work for for a short period of time and then they expire deleting 7 00:00:36,410 --> 00:00:40,310 all of your emails and all of the information on them. 8 00:00:40,310 --> 00:00:43,940 Now the cool thing about these accounts is first of all they're temporary. 9 00:00:43,940 --> 00:00:50,120 They require no set up so they want to request any personal information and they won't waste any time. 10 00:00:50,150 --> 00:00:55,490 As soon as you load the web site that offers the service you will be presented with your inbox which 11 00:00:55,490 --> 00:00:58,110 you can use straight away. 12 00:00:58,220 --> 00:01:01,480 So as you can see this can be very useful in many cases. 13 00:01:01,580 --> 00:01:07,820 If you wanted to communicate with someone for a short period of time or if you get asked for an email 14 00:01:07,820 --> 00:01:14,900 by a Web site and the Web sites will send you a confirmation link so you actually need to have a valid 15 00:01:14,920 --> 00:01:22,160 email then you can use this and in many cases you're asked to have a company email and these emails 16 00:01:22,160 --> 00:01:28,340 are great because they actually do look like company emails unlike other emails that you get from Gmail 17 00:01:28,340 --> 00:01:29,850 and so on. 18 00:01:30,170 --> 00:01:37,040 Now the main disadvantage with these email accounts is that they are relatively easy to break into. 19 00:01:37,100 --> 00:01:42,290 So you want to be careful about that but if you're using encryption which I'm going to show you later 20 00:01:42,290 --> 00:01:48,320 on in the course then even if someone reads your messages your data should be secure and encrypted as 21 00:01:48,320 --> 00:01:50,220 long as your keys are encrypted. 22 00:01:50,360 --> 00:01:53,150 But that's something to talk about for another lecture. 23 00:01:53,270 --> 00:01:58,700 For now let's have a look on how to use these temporary accounts an example. 24 00:01:58,700 --> 00:02:01,670 Right here we have temp mail address dot com. 25 00:02:01,670 --> 00:02:03,790 There is also term mail dot com. 26 00:02:04,040 --> 00:02:10,190 And I'm going to include a full list of all of these Web sites in the resources of this lecture. 27 00:02:10,220 --> 00:02:14,510 There are also hidden online services that offer the same service. 28 00:02:14,510 --> 00:02:20,620 So this Web site right here guerrilla mail dot com right here I'm actually on the clear net Web site. 29 00:02:20,660 --> 00:02:24,740 As you can see but they also offer a hidden service. 30 00:02:24,740 --> 00:02:31,790 So right here I have the DOT onion hidden Service Web site which is called Tor guerilla mail and pretty 31 00:02:31,790 --> 00:02:38,870 much it's the same functionality it gives you a temporary inbox which you can use for one hour after 32 00:02:38,870 --> 00:02:43,920 the hour everything gets deleted so using the inbox is very simple. 33 00:02:43,970 --> 00:02:49,340 You can see first of all you can actually set the name that you want to use for this email and here 34 00:02:50,150 --> 00:02:56,050 you can also set the domain so you can pick the AD domain from any domains that you want in here. 35 00:02:56,120 --> 00:03:02,060 And like I said this can be very useful if the Web site you're signing up for requires you to have a 36 00:03:02,060 --> 00:03:05,960 company email once you have these picked up. 37 00:03:05,960 --> 00:03:11,990 You can actually copy this email and share it on that Web site or send it to anyone that you want to 38 00:03:11,990 --> 00:03:13,730 receive emails from. 39 00:03:13,730 --> 00:03:21,320 But using the e-mail like this makes it easier to guess your idea and gain access to this inbox. 40 00:03:21,320 --> 00:03:25,910 So a better way of sharing it is to use the scrambled link in here. 41 00:03:25,910 --> 00:03:29,040 So this is basically the same e-mail that you see in here. 42 00:03:29,090 --> 00:03:37,460 It's just scrambled so that it's more difficult to know the I.D. so you can copy this and give it to 43 00:03:37,460 --> 00:03:39,690 anyone that wants to send you an e-mail. 44 00:03:39,770 --> 00:03:44,440 And just as an example I'm going to go to the clear net version of this Web site. 45 00:03:44,450 --> 00:03:52,430 This one right here guerilla mail dot com and I'm going to click on compose I'm going to set thee to 46 00:03:52,430 --> 00:04:03,250 e-mail to the e-mail that I have here on the darknet and let's set the subject to test and set the body 47 00:04:03,250 --> 00:04:10,200 to this is a test message now as you can see you can even add attachments. 48 00:04:10,230 --> 00:04:15,060 If you want but I will talk about file sharing and more details in the future. 49 00:04:15,210 --> 00:04:22,520 And once you're done we can just click on send and perfect as you can see it's telling you that the 50 00:04:22,520 --> 00:04:24,630 message is dispatched. 51 00:04:24,710 --> 00:04:31,980 Let's go to the darknet inbox in here and see if we're going to receive it and perfect as you can see 52 00:04:31,980 --> 00:04:33,920 we got a new message in here. 53 00:04:33,960 --> 00:04:43,240 So if we click on this and we have the content that we expect which says this is a text message. 54 00:04:43,330 --> 00:04:49,360 Now one thing I should note is as you can see here in the clear net version of this Web site you have 55 00:04:49,360 --> 00:04:52,720 the compose button where you can compose and send e-mails. 56 00:04:52,720 --> 00:04:57,600 But in the darknet version this functionality is not working as expected. 57 00:04:57,730 --> 00:05:00,770 And even if you click on reply it's not going to work. 58 00:05:01,570 --> 00:05:05,920 Now hopefully they fix this in the future by the time that you watch this lecture. 59 00:05:05,920 --> 00:05:13,090 But for now the darknet version can only be used to receive emails but that's not a big problem because 60 00:05:13,120 --> 00:05:18,790 as you can see through Tor and through tales we can actually still access clear net Web sites and we 61 00:05:18,790 --> 00:05:22,420 can make full use of this functionality. 62 00:05:22,880 --> 00:05:28,280 So like I said this is one option of receiving and sending emails. 63 00:05:28,340 --> 00:05:35,600 The pros is that it requires no information no time is wasted on signing up and everything gets deleted 64 00:05:36,170 --> 00:05:42,020 within an hour or if you're using other services such as this one you can pick how long you want to 65 00:05:42,020 --> 00:05:45,500 keep the account for the cons. 66 00:05:45,500 --> 00:05:48,080 This might be easier to break into. 67 00:05:48,200 --> 00:05:49,540 And it is temporary. 68 00:05:49,640 --> 00:05:51,830 So it will eventually expire. 69 00:05:51,830 --> 00:05:59,230 Therefore it might not be good for all scenarios or for everybody and like I said these are just two 70 00:05:59,230 --> 00:06:02,210 examples of Web sites that offer these services. 71 00:06:02,260 --> 00:06:08,530 Check out the resources of this lecture for a list of more Web sites that offer the same service with 72 00:06:08,530 --> 00:06:10,030 slightly different features.