Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

very possibly a dumb email question

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU
 
historian Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-09-09 06:49 PM
Original message
very possibly a dumb email question
If i use someone else's isp to send emails are the subscribers able to trace what was sent? Nothing illegal here but im helping my son do a research paper on the internet and security. Thanks
Refresh | 0 Recommendations Printer Friendly | Permalink | Reply | Top
RoyGBiv Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-09-09 07:12 PM
Response to Original message
1. Short answer ...
Edited on Wed Dec-09-09 07:13 PM by RoyGBiv
Yes and maybe.

Somewhat longer answer ...

This is true if I understand the question correctly. I'm interpreting this as the following:

You have an e-mail to send.

You happen to know the username/password for another person's ISP's mail server, know that this server accepts outside connections, and want to use it instead of your own.

You then wonder if the person will know you did this and/or being able to trace the e-mail back to you or the recipient.

Yes, the person *could*. There are logs that keep track of this. One of my e-mail accounts is set up to receive e-mails that bounce through two other servers before arriving at their destination. One of these I control myself, and I can see what passed through that server any time I want. If I turn on an option to save copies of everything that passes through it on that server, then I even have the text itself. (I actually do this because the whole point of that middle-man server is for backup purposes.)

The headers the recipient sees will also reveal information about the path the e-mail has taken, so if that person happens to be a friend of the person's whose account you use and shares that information (or if it is subpoenaed), then they'll know.

Finally, the ISP itself may have some monitor running that would flag for audit any account seen taking connections from different IP addresses or addresses outside its own domain.

From a practical standpoint, as long as this wasn't done often or in the commission of a crime, it probably wouldn't be noticed, but it could be.


Printer Friendly | Permalink | Reply | Top
 
historian Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-09-09 08:56 PM
Response to Reply #1
2. thanks
no crime i'm trying find info on this for a paper so i thank you very much
Printer Friendly | Permalink | Reply | Top
 
MyNameGoesHere Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-10-09 08:56 AM
Response to Original message
3. yes if done "legally" no if not.
You can actually forge the header and if the mail server does not employ some type of verification methods then you can pass yourself off as someone else. This is the most popular method spammers use. It amazes me that most ISP's do not use Reverse DNS lookup's or even Grey listing. If either of these two methods are used spam goes way down. Now if they could get more people to jump on the SNDS Smart Network Data Services then spam would be extremely manageable. But getting everyone to agree on delivery and messaging stadards is probably never going to happen.
Printer Friendly | Permalink | Reply | Top
 
historian Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-11-09 11:56 AM
Response to Reply #3
4. interesting but...
does that apply to businesses who want to protect confidential documents? Surely they must have some form of protection. this is a loop hole i hadnt known and is an excellent point for my paper. Thank you for the info.
Printer Friendly | Permalink | Reply | Top
 
RoyGBiv Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-11-09 12:19 PM
Response to Reply #4
5. E-mail ...

E-mail is not secure. This is a mantra to be repeated over and over again by anyone wanting to protect confidential information.

Businesses who use e-mail to exchange confidential information are asking for what's coming to them.

That said, the way you use e-mail in a more secure fashion is by encrypting, e.g. using PGP or OpenPGP to encrypt the e-mail before sending and allowing it to be unencrypted upon arrival at its destination.

If you're not familiar with this and want to explore the topic, go to http://www.gnupg.org
Printer Friendly | Permalink | Reply | Top
 
historian Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-11-09 12:22 PM
Response to Reply #5
6. thanks
this is very interesting and i envy you your knowledge. Just when i think i know it all...
Printer Friendly | Permalink | Reply | Top
 
RoyGBiv Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-11-09 01:05 PM
Response to Reply #6
7. No problem ...
Edited on Fri Dec-11-09 01:33 PM by RoyGBiv
MyNameGoesHere knows more than I do about this as I believe he is a network admin. I just dabble for my own purposes.

But one of my mentors back in the day put it this way, which he borrowed from someone else. Using e-mail is like sending a post card. It's probably true that no one is really going to see it, but almost anyone could see it, especially if they are actively trying to see it.

Digitally signing the e-mail is like adding a wax seal. Encrypting it is like using an armored truck.

None of it will prevent committed, prying eyes with enough resources, but you better your chances.
Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Jan 06th 2025, 08:51 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC