Guerrilla Mail

Last updated

Guerrilla Mail is a free disposable email address service launched in 2006. Visitors are automatically assigned a random email address upon visiting the site.

Contents

Features

Guerrilla Mail randomly generates disposable email addresses. [1] Disposable email addresses may be used as a means of spam prevention. [2] They may also be used if the user does not wish to give a real email, for example if they fear a data breach. Emails sent to addresses are kept for one hour before deletion. The site offers some choice of email domain names. [2] [3]

History

Guerrilla Mail was founded in 2006, in Chicago. [4]

Privacy-centered services saw an up-tick in public interest after the global surveillance disclosures beginning in 2013, especially concerning attention brought to materials leaked by Edward Snowden. According to The Mercury News in 2014, "[Guerrilla Mail] has done nearly half of its business in the past year". [4]

In December 2013, a Harvard College sophomore and Quincy House resident Eldo Kim used Guerrilla Mail to send a bomb threat to offices associated with Harvard, including the Harvard University Police Department and The Harvard Crimson , in order to delay a final exam. [5] [6] [7] It was alleged in an affidavit that the student accessed Guerrilla Mail through Tor, a fact that might've been given away in the IP address present in the email header. [8] [9]

In June 2017, it was revealed through court documents that the FBI used a social engineering technique known as phishing to target a Guerrilla Mail user. The case was unique, as it was the "first public example of the feds using a controversial update to a law allowing searches on users of anonymizing tools like Tor". [10] [11]

As of November 4, 2020, Guerrilla Mail stated on Twitter that their site had been taken down by their hosting provider, OVHCloud, due to a law enforcement request which OVHCloud refused to provide details about. [12] The site has since been reinstated.

Related Research Articles

<span class="mw-page-title-main">Email</span> Mail sent using electronic means

Electronic mail is a method of transmitting and receiving messages using electronic devices. It was conceived in the late–20th century as the digital version of, or counterpart to, mail. Email is a ubiquitous and very widely used communication medium; in current use, an email address is often treated as a basic and necessary part of many processes in business, commerce, government, education, entertainment, and other spheres of daily life in most countries.

<span class="mw-page-title-main">Spamming</span> Unsolicited electronic messages, especially advertisements

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose, or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

A bomb threat or bomb scare is a threat, usually verbal or written, to detonate an explosive or incendiary device to cause property damage, death, injuries, and/or incite fear, whether or not such a device actually exists.

An email address identifies an email box to which messages are delivered. While early messaging systems used a variety of formats for addressing, today, email addresses follow a set of specific rules originally standardized by the Internet Engineering Task Force (IETF) in the 1980s, and updated by RFC 5322 and 6854. The term email address in this article refers to just the addr-spec in Section 3.4 of RFC 5322. The RFC defines address more broadly as either a mailbox or group. A mailbox value can be either a name-addr, which contains a display-name and addr-spec, or the more common addr-spec alone.

Various anti-spam techniques are used to prevent email spam.

<span class="mw-page-title-main">Email spam</span> Unsolicited electronic advertising by email

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.

The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic, and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world. Given the high number of possible paths the traffic can transit, a third party watching a full connection is unlikely. The software that implements this layer is called an "I2P router", and a computer running I2P is called an "I2P node". I2P is free and open sourced, and is published under multiple licenses.

A Joe job is a spamming technique that sends out unsolicited e-mails using spoofed sender data. Early Joe jobs aimed at tarnishing the reputation of the apparent sender or inducing the recipients to take action against them, but they are now typically used by commercial spammers to conceal the true origin of their messages and to trick recipients into opening emails apparently coming from a trusted source.

<span class="mw-page-title-main">Yahoo! Mail</span> American email service

Yahoo! Mail is an email service offered by the American company Yahoo, Inc. The service is free for personal use, with an optional monthly fee for additional features. Business email was previously available with the Yahoo! Small Business brand, before it transitioned to Verizon Small Business Essentials in early 2022. Launched on October 8, 1997, as of January 2020, Yahoo! Mail has 225 million users.

Disposable email addressing, also known as DEA or dark mail or "masked" email, refers to an approach which involves a unique email address being used for every contact, entity, or for a limited number of times or uses. The benefit is that if anyone compromises the address or utilizes it in connection with email abuse, the address owner can easily cancel it without affecting any of their other contacts.

Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an unrelated party whose identity has been faked. Disposable email address or "masked" email is a different topic, providing a masked email address that is not the user's normal address, which is not disclosed, but forwards mail sent to it to the user's real address.

<span class="mw-page-title-main">Blue Frog</span>

Blue Frog was a freely-licensed anti-spam tool produced by Blue Security Inc. and operated as part of a community-based system which tried to persuade spammers to remove community members' addresses from their mailing lists by automating the complaint process for each user as spam is received. Blue Security maintained these addresses in a hashed form in a Do Not Intrude Registry, and spammers could use free tools to clean their lists. The tool was discontinued in 2006.

Anonymizer, Inc. is an Internet privacy company, founded in 1995 by Lance Cottrell, author of the Mixmaster anonymous remailer. Anonymizer was originally named Infonex Internet. The name was changed to Anonymizer in 1997 when the company acquired a web based privacy proxy of the same name developed by Justin Boyan at Carnegie Mellon University School of Computer Science. Boyan licensed the software to C2Net for public beta testing before selling it to Infonex. One of the first web privacy companies founded, Anonymizer creates a VPN link between its servers and its users computer, creating a random IP address, rather than the one actually being used. This can be used to anonymously report a crime, avoid spam, avoid Internet censorship, keep the users identity safe and track competitors, among other uses.

TrashMail is a free disposable e-mail address service created in 2002 by Stephan Ferraro, a computer science student at Epitech Paris which belongs now to Ferraro Ltd. The service provides temporary email addresses that can be abandoned if they start receiving email spam. It mainly forwards emails to a real hidden email address.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide, volunteer overlay network that consists of more than seven thousand relays.

People tend to be a lot less bothered by spam slipping through filters into their mailbox than having desired email ("ham") blocked. Trying to balance false negatives and false positives is a critical aspect of a successful anti-spam system. Because servers are not able to block all spam, there are multiple methods for individual users to allow users to control this balance.

<span class="mw-page-title-main">Tor Mail</span> Defunct Tor email service

Tor Mail was a Tor hidden service that went offline in August 2013 after an FBI raid on Freedom Hosting. The service allowed users to send and receive email anonymously to email addresses inside and outside the Tor network.

<span class="mw-page-title-main">The Farmer's Market</span> Former Dark Web market

The Farmer's Market, formerly Adamflowers, was an online black market for illegal drugs. It was founded by Marc Peter Willems in or before 2006, and moved operations to the dark web in 2010 using the Tor anonymity network. It was closed and several operators and users arrested in April 2012 as a result of Operation Adam Bomb, a two-year investigation led by the U.S. Drug Enforcement Administration (DEA).

<span class="mw-page-title-main">Proton Mail</span> End-to-end encrypted email service

Proton Mail is a Swiss end-to-end encrypted email service founded in 2013 headquartered in Plan-les-Ouates, Switzerland. It uses client-side encryption to protect email content and user data before they are sent to Proton Mail servers, unlike other common email providers such as Gmail and Outlook.com. The service can be accessed through a webmail client, the Tor network, or dedicated iOS and Android apps.

References

  1. Greenberg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired . Condé Nast. Retrieved 17 October 2014.
  2. 1 2 "How to Avoid Spam—Using Disposable Contact Information". Wired. ISSN   1059-1028 . Retrieved 11 February 2021.
  3. "Get a Free One-Hour Email Address with Guerrilla Mail". Lifehacker. 22 October 2011. Retrieved 11 February 2021.
  4. 1 2 Somerville, Heather (27 September 2014). "Tech responds to growing calls for Internet anonymity". The Mercury News . Digital First Media. Archived from the original on 30 April 2017. Retrieved 17 October 2014.
  5. "Harvard student Eldo Kim charged in final-exam bomb hoax". CNN . 18 December 2013.
  6. Fandos, Nicholas P. (17 December 2013). "Harvard Sophomore Charged in Bomb Threat". The Harvard Crimson . Retrieved 17 October 2014.
  7. "Harvard student made bomb threats to get out of exam, cops say". www.cbsnews.com. 17 December 2013. Retrieved 11 February 2021.
  8. "Eldo Kim Charged in Bomb Threat Case, Unlikely To Get Jail Time | News | The Harvard Crimson". www.thecrimson.com. Retrieved 11 February 2021.
  9. Brandom, Russell (18 December 2013). "FBI agents tracked Harvard bomb threats despite Tor". The Verge. Retrieved 11 February 2021.
  10. Fox-Brewster, Thomas (13 June 2017). "How The FBI Hacked A Dark Web Shopper Plotting A Mail Bomb Hit". Forbes . Retrieved 17 June 2017.
  11. "In The Matter Of The Search Of: The Use Of A Network Investigative Technique For A Computer Accessing Email Account". DocumentCloud . Retrieved 17 June 2017.
  12. @GuerrillaMail (4 November 2020). "It looks like or hosting provider, @OVHcloud, decided to shut down our services. The reason was that they received a law enforcement request (which they didn't forward to us, and refuse to share details about)" (Tweet). Retrieved 12 November 2020 via Twitter.