home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.comp.freeware      Generic free software discussions      39,988 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 39,087 of 39,988   
   Nomen Nescio to All   
   What Is An Anonymous Remailer? (1/2)   
   05 Sep 25 22:27:12   
   
   XPost: alt.privacy.anon-server, news.software.nntp   
   From: nobody@dizum.com   
      
   An anonymous remailer is a server that receives messages with embedded   
   instructions on where to send them next, and that forwards them without   
   revealing where they originally came from. There are Cypherpunk anonymous   
   remailers, Mixmaster anonymous    
   remailers, and nym servers, among others, which differ in how they work, in   
   the policies they adopt, and in the type of attack on anonymity of e-mail they   
   can (or are intended to) resist. Remailing as discussed in this article   
   applies to e-mails intended    
   for particular recipients, not the general public. Anonymity in the latter   
   case is more easily addressed by using any of several methods of anonymous   
   publication.   
   Contents   
      
       Types of remailer   
       Pseudonymous remailers   
       Cypherpunk remailers also called Type I   
       Mixmaster remailers also called Type II   
       Mixminion remailers also called Type III   
       Traceable remailers   
       Untraceable remailers   
       Web based mailer   
       Remailer statistics   
       Remailer abuse and blocking by governments   
       Remailer software   
      
   Types of remailer   
      
   There are several strategies that affect the anonymity of the handled e-mail.   
   In general, different classes of anonymous remailers differ with regard to the   
   choices their designers/operators have made. These choices can be influenced   
   by the legal    
   ramifications of operating specific types of remailers.   
      
   It must be understood that every data packet traveling on the Internet   
   contains the node addresses (as raw IP bit strings) of both the sending and   
   intended recipient nodes, and so no data packet can ever actually be anonymous   
   at this level. In addition,    
   all standards-based e-mail messages contain defined fields in their headers in   
   which the source and transmitting entities (and Internet nodes as well) are   
   required to be included.   
      
   Some remailers change both types of address in messages they forward, and the   
   list of forwarding nodes in e-mail messages as well, as the message passes   
   through; in effect, they substitute 'fake source addresses' for the originals.   
   The 'IP source address'   
    for that packet may become that of the remailer server itself, and within an   
   e-mail message (which is usually several packets), a nominal 'user' on that   
   server. Some remailers forward their anonymized e-mail to still other   
   remailers, and only after    
   several such hops is the e-mail actually delivered to the intended address.   
      
   There are, more or less, four types of remailers:   
   Pseudonymous remailers   
      
   A Pseudonymous remailer simply takes away the e-mail address of the sender,   
   gives a pseudonym to the sender, and sends the message to the intended   
   recipient (that can be answered via that remailer).   
   Cypherpunk remailers, also called Type I   
      
   A Cypherpunk remailer sends the message to the recipient stripping away the   
   sender address on it. One can not answer a message sent via a Cypherpunk   
   remailer. The message sent to the remailer can usually be encrypted, and the   
   remailer will decrypt it and    
   send it to the recipient address hidden inside the encrypted message. In   
   addition, it is possible to chain two or three remailers, so that each   
   remailer can't know who is sending a message to whom. Cypherpunk remailers do   
   not keep logs of transactions.   
   Mixmaster remailers, also called Type II   
      
   In Mixmaster, you compose an email to a remailer, which is relayed through   
   each node in the network using SMTP, until it finally arrives at your   
   recipient. Mixmaster can only send emails one way. An email is sent   
   anonymously to an individual, but for    
   them to be able to respond, a reply address must be included in the body of   
   the email. Also, Mixmaster remailers require the use of a computer program to   
   write messages. Such programs are not supplied as a standard part of most   
   operating systems or mail    
   management systems.   
   Mixminion remailers, also called Type III   
      
   A Mixminion remailer attempts to address the following challenges in Mixmaster   
   remailers: replies, forward anonymity, replay prevention and key rotation,   
   exit policies, integrated directory servers and dummy traffic. They are   
   currently available for the    
   Linux and Windows platforms. Some implementations are open source.   
   Traceable remailers   
      
   Some remailers establish an internal list of actual senders and invented names   
   such that a recipient can send mail to invented name AT some-remailer.example.   
   When receiving traffic addressed to this user, the server software consults   
   that list, and    
   forwards the mail to the original sender, thus permitting anonymous—though   
   traceable with access to the list—two way communication. The famous   
   "penet.fi" remailer in Finland did just that for several years. Because of the   
   existence of such lists in    
   this type of remailing server, it is possible to break the anonymity by   
   gaining access to the list(s), by breaking into the computer, asking a court   
   (or merely the police in some places) to order that the anonymity be broken,   
   and/or bribing an attendant.    
   This happened to penet.fi as a result of some traffic passed through it about   
   Scientology. The Church claimed copyright infringement and sued penet.fi's   
   operator. A court ordered the list be made available. Penet's operator shut it   
   down after destroying    
   its records (including the list) to retain identity confidentiality for its   
   users; though not before being forced to supply the court with the real e-mail   
   addresses of two of its users.   
      
   More recent remailer designs use cryptography in an attempt to provide more or   
   less the same service, but without so much risk of loss of user    
   onfidentiality. These are generally termed nym servers or pseudonymous   
   remailers. The degree to which they    
   remain vulnerable to forced disclosure (by courts or police) is and will   
   remain unclear, since new statutes/regulations and new cryptanalytic   
   developments proceed apace. Multiple anonymous forwarding among cooperating   
   remailers in different jurisdictions    
   may retain, but cannot guarantee, anonymity against a determined attempt by   
   one or more governments, or civil litigators.   
   Untraceable remailers   
      
   If users accept the loss of two-way interaction, identity anonymity can be   
   made more secure.   
      
   By not keeping any list of users and corresponding anonymizing labels for   
   them, a remailer can ensure that any message that has been forwarded leaves no   
   internal information behind that can later be used to break identity   
   confidentiality. However, while    
   being handled, messages remain vulnerable within the server (e.g., to Trojan   
   software in a compromised server, to a compromised server operator, or to   
   mis-administration of the server), and traffic analysis comparison of traffic   
   into and out of such a    
   server can suggest quite a lot—far more than almost any would credit.   
      
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca