Pseudonymous remailer
From Wikipedia, the free encyclopedia
A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a database of instructions on how to return messages to the real user. These instructions usually involve the anonymous remailer network itself, thus protecting the true identity of the user.
Primordial pseudonymous remailers once recorded enough information to trace the identity of the real user, making it possible for someone to obtain the identity of the real user through legal or illegal means. This form of pseudonymous remailer is no longer common.
David Chaum wrote an article in 1981 that described many of the features present in modern pseudonymous remailers. [1]
The Penet remailer, which lasted from 1993 to 1996, was a popular pseudonymous remailer.
Contents |
[edit] Contemporary Nym Servers
A nym server (short for "pseudonym server") is a server that provides an untraceable e-mail address, such that neither the nym server operator nor the operators of the remailers involved can discover which nym corresponds to which real identity.
To set up a nym, one creates a PGP keypair and submits it to the nym server, along with instructions (called a reply block) to anonymous remailers (such as Cypherpunk or Mixmaster) on how to send a message to his real address. The nym server returns a confirmation through this reply block. He then sends a message to the address in the confirmation.
To send a message through the nym server so that the From address is the nym, the user adds a few headers, signs the message with his nym key, encrypts it with the nym server key, and sends the message to the nym server, probably routed through some anonymous remailers. When the nym server gets the message, it decrypts the message and sends it on to the intended recipient, with the From: address being the user's nym.
When the nym server gets a message addressed to the nym, it appends it to the nym's reply block and sends it to the first remailer in the chain, which sends it to the next and so on until it reaches the user's real address. It is considered good practice to include instructions to encrypt it on the way, so that someone (or some organization) doing in/out traffic analysis on the nym server cannot easily match the message received by the user to the one sent by the nym server.
Existing "multi-use reply block" nym servers were shown to be susceptible to passive traffic analysis with one month's worth of incoming spam (based on 2005 figures) in a paper by Bram Cohen, Len Sassaman, and Nick Mathewson .
[edit] See also
- Anonymity
- Anonymous P2P
- Anonymous remailer
- Cypherpunk anonymous remailer (Type I)
- Mixmaster anonymous remailer (Type II)
- Mixminion (Type III)
- Spamhole
- Onion routing
- Data privacy
- Penet remailer
- Traffic analysis
[edit] Remailer Software
[edit] External links
[edit] References
- ^ See The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval Len Sassaman and Bram Cohen and Nick Mathewson (November 2005). "The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval". Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005). ACM Press.
[edit] Further reading
- Email Security, Bruce Schneier (ISBN 0-471-05318-X)
- Computer Privacy Handbook, Andre Bacard (ISBN 1-56609-171-3)