On 2/24/22 11:36, Grant Taylor via mailop wrote:

Maybe it's silly, but my understanding is that it's more difficult to /legally/ gain access to my email when it's hosted in my house as opposed to hosted on a VPS / CO-LO *without* /my/ /knowledge/ of it.  As in the police can take a warrant to the VPS provider / CO-LO and gain access to things /without/ /my/ /knowledge/.  Be it from a lack of monitoring on my part, gag order, what have you.  Conversely, the police can't come into my home *without* /my/ /knowledge/, even with a warrant.

Note:  This is predicated that I am, have been, and will be, WFH during the execution of the warrant.

Assuming that your home connection is typical residential broadband, consider a split system. Host your receiving SMTP at home with a dynamic DNS tracker to keep the MX pointed at your dynamic residential IP and use this for inbound mail to you.

Because sending mail from a dynamic residential IP is going to be problematic, use a VPS or VPN to an offsite hosted static IP for your outbound mail. Do no logging or storage at the offsite location.

Of course, if you're worried about search warrants, capturing traffic in flight is likely to be the means of interception rather than physical access to hardware located at your residence, so yes, maybe it's silly. End-to-end strong encryption isn't really universal for email traffic between different end systems. Even if it were, tracking the fact that the communication took place is trivial for three-letter agencies without visiting your residence even if the content is encrypted.

--
Jay Hennigan - j...@west.net
Network Engineering - CCIE #7880
503 897-8550 - WB6RDV
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to