Scooby Tor! Where Are You?
I notified that the exit node IP address in the TOR browser is not the real exit node IP. Then I started to drive the mystery machine for investigating the case. Real IP! Where are you?
Personal Website
I notified that the exit node IP address in the TOR browser is not the real exit node IP. Then I started to drive the mystery machine for investigating the case. Real IP! Where are you?
K-9 is an attractive, open-source email client for Android with support of IMAP, POP3, SMTP, and exchange protocols. Hence, this client does not support proxy feature. This problem is referenced in #704 #980 #2619. In this post I will talk about my contribution in K-9 project by adding SOCKs proxy feature, which can be used for connecting hidden mail services.
In previous post, I described about connecting Thunderbird, an open source email client for PC, to a hidden mail service. In this post I will talk about modifying K-9 mail and connecting Android client to the hidden mail service.
In the previous post, I’ve talked about configuring a hidden email server using hMailServer. In this post I will talk about how to access this hidden Email server. I’m using ThunderBird as email client, tajbakhsh.fake as the fake domain of email server (and accounts), two users ([email protected] and [email protected]).
During all the processes, I assume that the email server is configured as previous post and client has access to the TOR network.
In this post, I will talk about configuring an Email server which is accessible using TOR. Using TOR will make its IP to be hidden, also accessible if it is behind NAT (inside a home computer without a public IP). But the main question is why one should use this kind of scenario?
Many people may not trust messaging services such as Telegram or WhatsApp but want to have their own private communication system. In this tutorial, you can run your own mail server in your home LAN and access it through Internet without spending money for public IP or VPS.
For the email server part, I will use hMailServer, an open source email server developed for windows.
In a “Socks Rocks! The Good, The Bad and The Ugly” post, I wrote about configuring OpenVPN, TOR and Proxifier in order to hide the real IP and use web sites such as Google which do not allow lots of services for TOR exit nodes.
Literally, the ugly is removed from the previous post and openvpn directly connects to socks.
I’ve started a project named Onion Harvester for finding the Onion addresses in TOR hidden services which are not exposed by the owners. I believe that the real dark markets and interesting stuff of TOR networks relies in the dark.