Tor

K9

My Contribution in K9 Android Mail Client

My Contribution in K9 Android Mail Client

K-9 is an attractive, open-source email client for Android with support of IMAP, POP3, SMTP, and exchange protocols. Hence, this client does not support proxy feature. This problem is referenced in #704 #980 #2619. In this post I will talk about my contribution in K-9 project by adding SOCKs proxy feature, which can be used for connecting hidden mail services.

In previous post, I described about connecting Thunderbird, an open source email client for PC, to a hidden mail service. In this post I will talk about modifying K-9 mail and connecting Android client to the hidden mail service.

Continue reading Connecting to Hidden Mail Server using Android
Read more

TorBird

In the previous post, I’ve talked about configuring a hidden email server using hMailServer. In this post I will talk about how to access this hidden Email server. I’m using ThunderBird as email client, tajbakhsh.fake as the fake domain of email server (and accounts), two users (saman@tajbakhsh.fake and test@tajbakhsh.fake).

During all the processes, I assume that the email server is configured as previous post and client has access to the TOR network.

Continue reading Connecting to Hidden Mail Server
Read more

Onion hMailServer

In this post, I will talk about configuring an Email server which is accessible using TOR. Using TOR will make its IP to be hidden, also accessible if it is behind NAT (inside a home computer without a public IP). But the main question is why one should use this kind of scenario?

Many people may not trust messaging services such as Telegram or WhatsApp but want to have their own private communication system. In this tutorial, you can run your own mail server in your home LAN and access it through Internet without spending money for public IP or VPS.

For the email server part, I will use hMailServer, an open source email server developed for windows.

Continue reading Configuring a Hidden Email Server
Read more

TOR Spy Services

Knowing all possible web paths in the world is the initial step for making a search engine (SE). By means of  SE one can analyze the web for the material he/she likes. In normal Domain Name System, each TLD provider (Top Level Domain) can sell or release list of all its domains. As an example .com TLD can sell or release all the domains which are end with “.com“. But the problem is more complicated in TOR (or other hidden service providers). In this post I will talk about my tool named Onion Harvester and how to find initial points for finding hidden services to be crawled.

TOR Network

TOR Network

Continue reading Onion Harvester: First step to TOR Search Engines

Read more
WP to LinkedIn Auto Publish Powered By : XYZScripts.com