Anonymous remailer

related topics
{system, computer, user}
{law, state, case}
{math, number, function}
{work, book, publish}
{war, force, army}
{rate, high, increase}
{film, series, show}
{group, member, jewish}

An anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from. There are Cypherpunk anonymous remailers, Mixmaster anonymous remailers, and nym servers, among others which differ in how they work, in the policies they adopt, and in the type of attack on anonymity of email they can (or are intended to) resist. Remailing as discussed in this article applies to emails intended for particular recipients, not the general public. Anonymity in the latter case is more easily addressed by using any of several methods of anonymous publication.

Contents

Types of remailer

There are several strategies which contribute to making the e-mail so handled (more, or less) anonymous. In general, different classes of anonymous remailers differ with regard to the choices their designers/operators have made. These choices can be influenced by the legal ramifications of operating specific types of remailers.[1]

It must be understood that every data packet traveling on the Internet contains the node addresses (as raw IP bit strings) of both the sending and intended recipient nodes, and so no data packet can ever actually be anonymous at this level. However, if the IP source address is false, there will be no easy way to trace the originating node (and so the originating entity for the packet). In addition, all standards-based email messages contain defined fields in their headers in which the source and transmitting entities (and Internet nodes as well) are required to be included. However, since most users of email do not have very much technical expertise, the full headers are usually suppressed by mail reading software. Thus, many users have never seen one.

Some remailers change both types of address in messages they forward, and the list of forwarding nodes in email messages as well, as the message passes through; in effect, they substitute 'fake source addresses' for the originals. The 'IP source address' for that packet may become that of the remailer server itself, and within an email message (which is usually several packets), a nominal 'user' on that server. Some remailers forward their anonymized email to still other remailers, and only after several such hops is the email actually delivered to the intended address.

There are, more or less, four types of remailers:

A Pseudonymous remailer, simply takes away the email address of the sender, gives a pseudonym to the sender and sends the message to the intended recipient (that can be answered via that remailer).

A Cypherpunk remailer sends the message to the recipient stripping away the sender address on it. You can not answer a message sent via a Cypherpunk remailer. You can usually encrypt the message sent to the remailer, and the remailer will decrypt it and send it to the recipient address hidden inside the encrypted message. In addition, you can chain 2 or 3 remailers, so each remailer can't know who is sending a message to whom. Cypherpunk remailers do not keep logs of transactions.

Full article ▸

related documents
Guglielmo Marconi
Enhanced 911
PCX
Gentoo Linux
Windows NT
Solaris (operating system)
Windows 1.0
User Datagram Protocol
Hercules emulator
Gopher (protocol)
ENIAC
Windows Me
Windows API
Enterprise JavaBean
Apple Lisa
ISCSI
Intel 8085
DLL hell
Intel 8051
Parallel port
XScale
LINC
ARCNET
Intelligent network
Audio Video Interleave
Slave clock
Dial-up internet access
UNIVAC I
Pocket PC
QNX