Hacker Newsnew | comments | show | ask | jobs | submit login

And he can use this on his heavily monitored work computer through the day without arousing suspicions?

Step 1 is for him to develop an official need for untraceable email with covert agents.

Step 2 is to use that for the affair as well. (Which under the hood could be something like the above.)




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: