Tag Archives: email

How to send email to a phone: Email to SMS

Standard email can be sent to virtually any mobile phone as a text message, or SMS. One can use this email address to send text message from the computer to cell phone or vice-versa. All you have to do is figure out the email address to your friend’s cell phone.

First, determine the carrier of the phone service used by the intended recipient. In my case, the area code is 615 and the prefix or exchange is 642. I entered the information into a Telco Data web page designed for this very purpose (determining the carrier).

Input an Area Code (required) followed by the Prefix

The next screen informed me that the carrier for my friend’s phone service is Nextel. Armed with this information, I can now consult various lists that provide the specific naming conventions for mobile phone email addresses, thanks to the fact that every cell phone has an email address associated with it.

Next, I used this simple example to figure out the email address to my friend’s phone. Be sure not to use any punctuation within the phone number.

Nextel (now Sprint Nextel)
[10-digit telephone number]@messaging.nextel.com
Example: 1234567890@messaging.nextel.com

My result

My message was returned undeliverable… so I searched for more alternatives or updated instructions and could find none; however, I did find a list with two other possible Nextel domains:

Nextel: number@messaging.nextel.com
Nextel: number@page.nextel.com
Nextel: number@nextel.com.br

Resources: How to send email to a phone: SMS 101

Saturday, June 2, 2012

Tor Project: Security and anonymity

Possibilities for anonymous email & anonymous blogging

These are notes I took as I poked around to discover how much trouble it would be to create a reasonably anonymous email and a reasonably anonymous blog. The Tor Project stood out. The security level need not be too high; I was mainly interested in keeping average and slightly above average users from being able to quickly determine the identity of the blogger.

Tor Project

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Why you need Tor

Using Tor protects you against a common form of Internet surveillance known as “traffic analysis.” Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you’re traveling abroad and you connect to your employer’s computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that’s an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you’re doing and, possibly, what you’re saying. That’s because it focuses on the header, which discloses source, destination, size, timing, and so on.

A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.
Source: https://www.torproject.org/about/overview.html.en

Resources: Anonymous email, anonymous blogging

Andy Baio: Think You Can Hide, Anonymous Blogger? Two Words: Google Analytics -Wired
Hide My Ass – Anonymous Email – Free disposable email service for receiving emails anonymously
Google Analytics A Potential Threat to Anonymous Bloggers – Waxy
How to Blog Anonymously Using TOR
How to make an anonymous blog (Part 2) – Jay Whale
A Technical Guide to Anonymous Blogging: Security measures for hiding your identity online – Tech Soup
How To Send Anonymous Emails – Tech Cast

Resources: Tor

Tor Project
Tor for Windows 2.2.35-5
Internet Tool Downloads: Tor – PC World

This post was started on Monday, February 13, 2012.

Recommended email accounts

I have found it wise to use a separate email account for subscriptions, newsletters, marketing material, advertisements, etc.

  1. Main email address. I currently use a Gmail account as my main email address; I am huge fan of Google and its many services, and Gmail filters out spam better than any other account I’ve ever had. Of course, Gmail is free, like most Google services.
  2. Backup email address. It’s wise to have a backup; also, when you start creating sites, blogs, landing pages, accounts, etc., you are going to encounter situations where you actually need a backup email, plus you will likely want to use certain email addresses for different purposes at some point.
  3. Junk/ subscriptions. I use my Yahoo email address for all subscriptions, newsletters, creating free accounts for hundreds of free web tools and software, junk mail, and so on. Other sources of free webmail: Live.com (Hotmail)

Removed content
If you don’t already have a free webmail account – which will preferably represent your third email address – please create one before doing this.