>>217
>Pond
>>>Pond is forward secure, asynchronous messaging for the discerning. Pond messages are asynchronous, but are not a record; they expire automatically a week after they are received.
May I suggest to give a look at onionmail
Clearnet site: onionmail.info
Hidden site: louhlbgyupgktsw7.onion
It's free software and you can download it from their site. It's a federation of servers. Like XMPP, each one can talk to each other, and the whole subnet can talk to other Tor or clearnet email providers.
Note that the site hosts just a list of public hidden node, that are running the real servers
>https://archive.is/http://www.hacker10.com/internet-anonymity/onionmail-an-anonymous-mail-server-running-on-tor/
May I underline something in "Rulez" page you can look at browsing one of the actual servers i.e.
>http://wc2eyfmw7wrwomf4.onion/rulez.html
or
>http://ndo2plzaruzxk6sb.onion/rulez.html
or
>http://ridotnp5m5lp22gw.onion/rulez.html
and so on, pick one
>
>[2.0] Sending emails
>
>(1) Mail messages are saved only in the recipient's server and encrypted
>with multiple asymmetric keys.
>
>Communicating with the server
>
>To communicate with the server it's sufficient to send a message to
>server@<xyz>.onion (Where <xyz> is identical to your address after "@").
(then there's a list of IRC-alike commands to create your own spam list and so on)
>[5.0] Create your OnionMail address
>
>1) Get your public PGP key and copy the ASCII armor.
>2) Send a message to the server (server@address.onion) with subject:
> NEWUSER username
> Where username is your user name and the address part before "@".
> Paste the public key into the body of the message.
>[9.0] User configuration.
>
>To read and configure the parameters of your account, send a message to the
>server with subject the word "SETTINGS".
but what sounds very close to Pond and seems interesting to me is
>(3) Messages, either read or not, are deleted automatically from the
>server after a few days of their reception.
Also, in the article cited above
>OnionMail server saves messages and it automatically erases them after reading or if they have not been picked up by the user in a period of days, using the wipe command (Linux) to make forensic recovery impossible.
So, as far as I've understood, it's a Pond-ish service that forces users to issue their intra-service PGP keys (in order to store your mail asymmetrically encrypted and regardless of the fact that you're using OpenPGP in your mails) and it deletes periodically scrubs your mail folders.
>An OnionMail email inbox is encrypted with RSA/AES asymmetric encryption keys and user passwords, data is then hashed and scattered around multiple OnionMail servers in the network, if a server is seized no meaningful information or metadata can be obtained. Another security feature is the ability to remotely nuke a server’s digital certificate, this is useful if an administrator loses physical access to the server, OnionMail checks the legitimacy of digital certificates in the network and servers not using a valid one will be disconnected.
Is this perfection? Why I don't see this service advertised everywhere?