Cypherpunk anonymous remailer
Encyclopedia
A cypherpunk
anonymous remailer is a Type I anonymous remailer
that takes messages encrypted with PGP
or GPG
, or in some cases in plain text, and forwards them removing any identifying information from the header.
Step 2: Import remailer's public keys into PGP
or GPG
.
Step 3: Compose Message
Step 4: Encrypt Message
Step 5: Send Encrypted Message to Remailer
Cypherpunk
A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change.Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography...
anonymous remailer is a Type I anonymous remailer
Anonymous remailer
An anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from...
that takes messages encrypted with PGP
Pretty Good Privacy
Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security...
or GPG
GNU Privacy Guard
GNU Privacy Guard is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP...
, or in some cases in plain text, and forwards them removing any identifying information from the header.
Sending a Cypherpunk Message
Step 1: Retrieving the remailer's Public Key.- Generally you can get a Cypherpunk remailer's public key by sending an email message with the subject "remailer-key" to the server you wish to use.
Step 2: Import remailer's public keys into PGP
Pretty Good Privacy
Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security...
or GPG
GNU Privacy Guard
GNU Privacy Guard is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP...
.
Step 3: Compose Message
- Compose the message in your favorite text editor, using the following template:
::
Anon-To:
Subject:
Step 4: Encrypt Message
- Use PGPPretty Good PrivacyPretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security...
or GPGGNU Privacy GuardGNU Privacy Guard is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP...
to encrypt the message that you just composed.
Step 5: Send Encrypted Message to Remailer
- Prepare an email to send to the Cypherpunk remailer using the following template:
Encrypted: PGP
-----BEGIN PGP MESSAGE-----
-----END PGP MESSAGE-----
- Then send it.
See also
- AnonymityAnonymityAnonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...
- Anonymous P2PAnonymous P2PAn anonymous P2P communication system is a peer-to-peer distributed application in which the nodes or participants are anonymous or pseudonymous...
- Anonymous remailerAnonymous remailerAn anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from...
- Mixmaster anonymous remailerMixmaster anonymous remailerMixmaster is a Type II anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. Mixmaster was originally written by Lance Cottrell, and was maintained by Len Sassaman Peter Palfrader is the...
(Type II) - MixminionMixminionMixminion is the standard implementation of the Type III anonymous remailer protocol. Mixminion can send and receive anonymous e-mail.Mixminion uses a mix network architecture to provide strong anonymity, and prevent eavesdroppers and other attackers from linking senders and recipients...
(Type III)
- Mixmaster anonymous remailer
- Onion routingOnion routingOnion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Like someone unpeeling an onion, each onion router removes a layer of encryption to uncover routing instructions, and...
- Tor (anonymity network)Tor (anonymity network)Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis...
- Tor (anonymity network)
- Pseudonymous remailerPseudonymous remailerA pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a...
(a.k.a. nym servers)- Penet remailerPenet remailerThe Penet remailer was a pseudonymous remailer operated by Johan "Julf" Helsingius of Finland from 1993 to 1996. Its initial creation stemmed from an argument in a Finnish newsgroup over whether people should be required to tie their real name to their online communications...
- Penet remailer
- Anonymous P2P
- Data privacyData privacyInformation privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them....
- Traffic analysisTraffic analysisTraffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and...
Howtos and Examples
- About.com: Send Email Anonymously — Chaining Remailers with PGP
- Anonymous.to: Cypherpunk Tutorial
- Feraga.com: Howto use a Type I Anonymous Remailer (link not active 12 May 2010)
Further reading
- Email Security, Bruce SchneierBruce SchneierBruce Schneier is an American cryptographer, computer security specialist, and writer. He is the author of several books on general security topics, computer security and cryptography, and is the founder and chief technology officer of BT Managed Security Solutions, formerly Counterpane Internet...
(ISBN 0-471-05318-X) - Computer Privacy Handbook, Andre Bacard (ISBN 1-56609-171-3)