Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Anonymous remailer
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Types of remailer== There are several strategies that affect the anonymity of the handled e-mail. In general, different classes of anonymous remailers differ with regard to the choices their designers/operators have made. These choices can be influenced by the legal ramifications of operating specific types of remailers.<ref>du Pont, George F. (2001) [http://www.thsh.com/documents/JTLM.pdf The Time Has Come for Limited Liability for Operators of True Anonymity Remailers in Cyberspace: An Examination of the Possibilities and Perils] {{Webarchive|url=https://web.archive.org/web/20160305043023/http://www.thsh.com/documents/JTLM.pdf |date=2016-03-05 }}"Journal of Technology Law & Policy"</ref> It must be understood that every [[data packet]] traveling on the [[Internet]] contains the node addresses (as raw [[Internet Protocol|IP]] bit strings) of both the sending and intended recipient nodes, and so no data packet can ''ever'' actually be anonymous at this level {{citation needed|date=January 2016}}. In addition, all standards-based e-mail messages contain defined fields in their headers in which the source and transmitting entities (and Internet nodes as well) are required to be included. Some remailers change both types of address in messages they forward, and the list of forwarding nodes in e-mail messages as well, as the message passes through; in effect, they substitute 'fake source addresses' for the originals. The 'IP source address' for that packet may become that of the remailer server itself, and within an e-mail message (which is usually several packets), a nominal 'user' on that server. Some remailers forward their anonymized e-mail to still other remailers, and only after several such hops is the e-mail actually delivered to the intended address. There are, more or less, four types of remailers: ===Pseudonymous remailers=== A [[pseudonymous remailer]] simply takes away the e-mail address of the sender, gives a pseudonym to the sender, and sends the message to the intended recipient (that can be answered via that remailer).<ref>{{cite journal |last=Froomkin |first=A. Michael |author-link=Michael Froomkin |title=Anonymity and its Enmities |date=1995 |volume=1 |journal=Journal of Online Law |at=art. 4 |ssrn=2715621 |location=Rochester, NY }}</ref> ===Cypherpunk remailers, also called Type I=== A [[Cypherpunk anonymous remailer|Cypherpunk remailer]] sends the message to the recipient, stripping away the sender address on it. One can not answer a message sent via a Cypherpunk remailer. The message sent to the remailer can usually be encrypted, and the remailer will decrypt it and send it to the recipient address hidden inside the encrypted message. In addition, it is possible to chain two or three remailers, so that each remailer can't know who is sending a message to whom. Cypherpunk remailers do not keep logs of transactions. ===Mixmaster remailers, also called Type II=== In [[Mixmaster anonymous remailer|Mixmaster]], the user composes an email to a remailer, which is relayed through each node in the network using [[SMTP]], until it finally arrives at the final recipient. Mixmaster can only send emails one way. An email is sent anonymously to an individual, but for them to be able to respond, a reply address must be included in the body of the email. Also, Mixmaster remailers require the use of a computer program to write messages. Such programs are not supplied as a standard part of most operating systems or mail management systems. ===Mixminion remailers, also called Type III=== A [[Mixminion]] remailer attempts to address the following challenges in Mixmaster remailers: replies, forward anonymity, replay prevention and key rotation, exit policies, integrated directory servers and dummy traffic. They are currently available for the Linux and Windows platforms. Some implementations are open source.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)