Type of site
|Webmail, E-Mail service|
|Available in||English language English|
|URL||sigaint.org, sigaintevyh2rzvw.onion (defunct)|
In April 2015, a number of user accounts were compromised in what was speculated at the time to be a government-sponsored de-anonymization attack from 70 different exit nodes. A SIGAINT administrator said that the hidden service was not hacked but malicious exit nodes had modified their clearnet page so that its link to the hidden service pointed to an imposter hidden service, effectively tricking users with a phishing attack that harvested login credentials. SIGAINT has since added SSL to their gateway to protect against such attacks.
The service is currently down. Both its ".org" website and its onion link return error code 500.
- "Interview With "Sigaint DarkNet Email" Admin". DeepDotWeb. 2015-02-16. Archived from the original on 2015-03-23.
- SIGAINT Admin. "SIGAINT email service targeted by 70 bad exit nodes". tor-talk. Tor Project. Retrieved 2016-08-31.
- Pauli, Darren (4 May 2016). "How to evade the NSA: OpSec guide for journalists also used by terrorists". Retrieved 26 May 2016.
- Maria, Korolov (13 May 2016). "Terrorists opt for consumer tools". Retrieved 26 May 2016.
- Paganini, Pierluigi (26 April 2015). "Dark Web Email Service SIGAINT hacked by the Intelligence". Retrieved 26 May 2016.
- Franceschi-Bicchierai, Lorenzo (24 April 2015). "After Hacks, A Dark Web Email Provider Says a Government Spied on Its Users". Retrieved 25 September 2016.
- SIGAINT. "SIGAINT Incidents Report". Retrieved 25 September 2016.
- Leyden, John. "Dark net webmail provider Sigaint still in the, er, dark". Retrieved 6 March 2017.