{"success":1,"onion":[{"id":"3117316","titolo":"\n doc\/TorCitadel \u2013 Tor Bug Tracker & Wiki\n ","ricetta":"[Online \/ ] doc\/TorCitadel \u2013 Tor Bug Tracker & Wiki\nLoginPreferencesHelp\/GuideAbout TracRegisterForgot your password?\nView TicketsWikiTags\nwiki:doc\/TorCitadel\nContext Navigation\n\u2190 Previous VersionView Latest VersionNext Version \u2192\nVersion 19 (modified by renne, 4 years ago)\n(diff)\nIPTables rules improved and commented\nTable of ContentsPrerequisitesInstallationRaspberryPiGeneric Debian\/Ubuntu\nTorCitadel - Network of homemade MAIL- and JABBER-servers with TOR transport encryption\nIf you use email, your SMTP client or your browser sends the email to an email server. Depending on your mail provider this can be encrypted - or not and be free to sniff for intelligence agencies and hackers. Your mail provider has full access to your mails on his server - intelligence agencies, too. When your mail provider sends your mail to the recipients mail provider the connection is often unencrypted - and can be sniffed again. The remote mail provider - and intelligence agencies - have access to your mail on the r...","url":"http:\/\/ea5faa5po25cf7fb.onion\/projects\/tor\/wiki\/doc\/TorCitadel?version=19"}]}