Misplaced Pages

SIGAINT: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 19:09, 29 March 2023 editCitation bot (talk | contribs)Bots5,441,529 edits Add: website, date. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | #UCB_webform 227/287← Previous edit Latest revision as of 21:27, 14 June 2023 edit undoNotrealname1234 (talk | contribs)Extended confirmed users4,491 edits Rescuing 6 sources and tagging 0 as dead.) #IABot (v2.0.9.5Tag: IABotManagementConsole [1.2] 
Line 13: Line 13:
|registration = Required |registration = Required
|language = ] |language = ]
|num_users = about 370,000<ref name="tortalk">{{cite web|last1=SIGAINT Admin|title=SIGAINT email service targeted by 70 bad exit nodes|url=https://lists.torproject.org/pipermail/tor-talk/2015-April/037549.html|website=tor-talk|date=23 April 2015 |publisher=Tor Project|accessdate=2016-08-31}}</ref> |num_users = about 370,000<ref name="tortalk">{{cite web|last1=SIGAINT Admin|title=SIGAINT email service targeted by 70 bad exit nodes|url=https://lists.torproject.org/pipermail/tor-talk/2015-April/037549.html|website=tor-talk|date=23 April 2015|publisher=Tor Project|accessdate=2016-08-31|archive-date=2016-03-04|archive-url=https://web.archive.org/web/20160304012144/https://lists.torproject.org/pipermail/tor-talk/2015-April/037549.html|url-status=live}}</ref>
|content_license = |content_license =
|programming language = |programming language =
Line 27: Line 27:
'''SIGAINT''' was a ] offering secure ] services. According to its FAQ page, its web interface used ] which does not rely on ]. Passwords couldn't be recovered. Users received two addresses per inbox: one at sigaint.org for receiving ] emails and the other at its ] address only for receiving emails sent from other Tor-enabled email services. Free accounts had 50 MB of storage space and expired after one year of inactivity. Upgraded accounts had access to ], ], ], larger size limits, ], and never expired. '''SIGAINT''' was a ] offering secure ] services. According to its FAQ page, its web interface used ] which does not rely on ]. Passwords couldn't be recovered. Users received two addresses per inbox: one at sigaint.org for receiving ] emails and the other at its ] address only for receiving emails sent from other Tor-enabled email services. Free accounts had 50 MB of storage space and expired after one year of inactivity. Upgraded accounts had access to ], ], ], larger size limits, ], and never expired.


The service was recommended by various security specialists as a highly secure email service.<ref>{{cite news|last1=Pauli|first1=Darren|title=How to evade the NSA: OpSec guide for journalists also used by terrorists|url=https://www.theregister.co.uk/2016/05/04/opsec_guide_for_hacks_now_terrorist_fodder/|accessdate=26 May 2016|date=4 May 2016}}</ref><ref>{{cite news|last1=Maria|first1=Korolov|title=Terrorists opt for consumer tools|url=http://www.csoonline.com/article/3069977/cyber-attacks-espionage/terrorists-opt-for-consumer-tools.html|accessdate=26 May 2016|date=13 May 2016}}</ref><ref name=deepdotweb/> The service was recommended by various security specialists as a highly secure email service.<ref>{{cite news|last1=Pauli|first1=Darren|title=How to evade the NSA: OpSec guide for journalists also used by terrorists|url=https://www.theregister.co.uk/2016/05/04/opsec_guide_for_hacks_now_terrorist_fodder/|accessdate=26 May 2016|date=4 May 2016|archive-date=31 May 2016|archive-url=https://web.archive.org/web/20160531114016/http://www.theregister.co.uk/2016/05/04/opsec_guide_for_hacks_now_terrorist_fodder|url-status=live}}</ref><ref>{{cite news|last1=Maria|first1=Korolov|title=Terrorists opt for consumer tools|url=http://www.csoonline.com/article/3069977/cyber-attacks-espionage/terrorists-opt-for-consumer-tools.html|accessdate=26 May 2016|date=13 May 2016|archive-date=14 October 2016|archive-url=https://web.archive.org/web/20161014021123/http://www.csoonline.com/article/3069977/cyber-attacks-espionage/terrorists-opt-for-consumer-tools.html|url-status=live}}</ref><ref name=deepdotweb/>


In April 2015, a number of user accounts were compromised in what was speculated at the time to be a government-sponsored ] attack from 70 different exit nodes.<ref>{{cite news|last1=Paganini|first1=Pierluigi|title=Dark Web Email Service SIGAINT hacked by the Intelligence|url=http://securityaffairs.co/wordpress/36292/hacking/sigaint-hacked-by-intelligence.html|accessdate=26 May 2016|date=26 April 2015}}</ref><ref>{{cite news|last1=Franceschi-Bicchierai|first1=Lorenzo|title=After Hacks, A Dark Web Email Provider Says a Government Spied on Its Users|url=https://motherboard.vice.com/en_uk/read/after-hacks-a-dark-web-email-provider-says-a-government-spied-on-its-users|accessdate=25 September 2016|date=24 April 2015}}</ref> A SIGAINT administrator said that the hidden service was not hacked but malicious exit nodes had modified their clearnet page so that its link to the hidden service pointed to an imposter hidden service, effectively tricking users with a ] attack that harvested login credentials.<ref name="tortalk" /> SIGAINT has since added SSL to their gateway to protect against such attacks.<ref>{{cite web|last1=SIGAINT|title=SIGAINT Incidents Report|url=https://www.sigaint.org/incidents.html|accessdate=25 September 2016|archive-date=27 September 2016|archive-url=https://web.archive.org/web/20160927165758/https://www.sigaint.org/incidents.html|url-status=dead}}</ref> In April 2015, a number of user accounts were compromised in what was speculated at the time to be a government-sponsored ] attack from 70 different exit nodes.<ref>{{cite news|last1=Paganini|first1=Pierluigi|title=Dark Web Email Service SIGAINT hacked by the Intelligence|url=http://securityaffairs.co/wordpress/36292/hacking/sigaint-hacked-by-intelligence.html|accessdate=26 May 2016|date=26 April 2015|archive-date=10 September 2016|archive-url=https://web.archive.org/web/20160910020716/http://securityaffairs.co/wordpress/36292/hacking/sigaint-hacked-by-intelligence.html|url-status=live}}</ref><ref>{{cite news|last1=Franceschi-Bicchierai|first1=Lorenzo|title=After Hacks, A Dark Web Email Provider Says a Government Spied on Its Users|url=https://motherboard.vice.com/en_uk/read/after-hacks-a-dark-web-email-provider-says-a-government-spied-on-its-users|accessdate=25 September 2016|date=24 April 2015|archive-date=21 October 2016|archive-url=https://web.archive.org/web/20161021141941/http://motherboard.vice.com/en_uk/read/after-hacks-a-dark-web-email-provider-says-a-government-spied-on-its-users|url-status=live}}</ref> A SIGAINT administrator said that the hidden service was not hacked but malicious exit nodes had modified their clearnet page so that its link to the hidden service pointed to an imposter hidden service, effectively tricking users with a ] attack that harvested login credentials.<ref name="tortalk" /> SIGAINT has since added SSL to their gateway to protect against such attacks.<ref>{{cite web|last1=SIGAINT|title=SIGAINT Incidents Report|url=https://www.sigaint.org/incidents.html|accessdate=25 September 2016|archive-date=27 September 2016|archive-url=https://web.archive.org/web/20160927165758/https://www.sigaint.org/incidents.html|url-status=dead}}</ref>


The service is currently down. Both its ".org" website and its onion link return error code 500.<ref>{{cite web|last=Leyden|first=John|title=Dark net webmail provider Sigaint still in the, er, dark|website=] |url=https://www.theregister.co.uk/2017/03/02/sigaint_goes_dark/|accessdate=6 March 2017}}</ref> The service is currently down. Both its ".org" website and its onion link return error code 500.<ref>{{cite web|last=Leyden|first=John|title=Dark net webmail provider Sigaint still in the, er, dark|website=]|url=https://www.theregister.co.uk/2017/03/02/sigaint_goes_dark/|accessdate=6 March 2017|archive-date=18 July 2017|archive-url=https://web.archive.org/web/20170718134114/http://www.theregister.co.uk/2017/03/02/sigaint_goes_dark/|url-status=live}}</ref>


== See also == == See also ==

Latest revision as of 21:27, 14 June 2023

SIGAINT
Type of siteWebmail, E-Mail service
Available in English
URLsigaint.org, sigaintevyh2rzvw.onion (defunct)
CommercialNo
RegistrationRequired
Usersabout 370,000
Current statusOffline

SIGAINT was a Tor hidden service offering secure email services. According to its FAQ page, its web interface used SquirrelMail which does not rely on JavaScript. Passwords couldn't be recovered. Users received two addresses per inbox: one at sigaint.org for receiving clearnet emails and the other at its .onion address only for receiving emails sent from other Tor-enabled email services. Free accounts had 50 MB of storage space and expired after one year of inactivity. Upgraded accounts had access to POP3, IMAP, SMTP, larger size limits, full disk encryption, and never expired.

The service was recommended by various security specialists as a highly secure email service.

In April 2015, a number of user accounts were compromised in what was speculated at the time to be a government-sponsored de-anonymization attack from 70 different exit nodes. A SIGAINT administrator said that the hidden service was not hacked but malicious exit nodes had modified their clearnet page so that its link to the hidden service pointed to an imposter hidden service, effectively tricking users with a phishing attack that harvested login credentials. SIGAINT has since added SSL to their gateway to protect against such attacks.

The service is currently down. Both its ".org" website and its onion link return error code 500.

See also

References

  1. ^ "Interview With "Sigaint DarkNet Email" Admin". DeepDotWeb. 2015-02-16. Archived from the original on 2015-03-23.
  2. ^ SIGAINT Admin (23 April 2015). "SIGAINT email service targeted by 70 bad exit nodes". tor-talk. Tor Project. Archived from the original on 2016-03-04. Retrieved 2016-08-31.
  3. Pauli, Darren (4 May 2016). "How to evade the NSA: OpSec guide for journalists also used by terrorists". Archived from the original on 31 May 2016. Retrieved 26 May 2016.
  4. Maria, Korolov (13 May 2016). "Terrorists opt for consumer tools". Archived from the original on 14 October 2016. Retrieved 26 May 2016.
  5. Paganini, Pierluigi (26 April 2015). "Dark Web Email Service SIGAINT hacked by the Intelligence". Archived from the original on 10 September 2016. Retrieved 26 May 2016.
  6. Franceschi-Bicchierai, Lorenzo (24 April 2015). "After Hacks, A Dark Web Email Provider Says a Government Spied on Its Users". Archived from the original on 21 October 2016. Retrieved 25 September 2016.
  7. SIGAINT. "SIGAINT Incidents Report". Archived from the original on 27 September 2016. Retrieved 25 September 2016.
  8. Leyden, John. "Dark net webmail provider Sigaint still in the, er, dark". The Register. Archived from the original on 18 July 2017. Retrieved 6 March 2017.
Tor onion services
Search engines
News
File storage and peer-to-peer
file sharing
Email and
instant messaging
Social media and forums
Financial
Darknet markets
Document archives
Nonprofit organizations
Operating systems
Government
Whistleblowing
Pornography
Other
Sites in italics are now offline or discontinued (not counting ambiguously forked sites).


Stub icon

This World Wide Web–related article is a stub. You can help Misplaced Pages by expanding it.

Categories: