Cypherpunk anonymous remailer
A cypherpunk anonymous remailer is a Type I anonymous remailer that takes messages encrypted with PGP or GPG, or in some cases in plain text, and forwards them removing any identifying information from the header.
Sending a Cypherpunk Message
Step 1: Retrieving the remailer's Public Key.
- Generally you can get a Cypherpunk remailer's public key by sending an email message with the subject "remailer-key" to the server you wish to use.
Step 3: Compose Message
- Compose the message in your favorite text editor, using the following template:
:: Anon-To: <Recipient Email Address> ## Subject: <Subject> <Message Text>
Step 4: Encrypt Message
Step 5: Send Encrypted Message to Remailer
- Prepare an email to send to the Cypherpunk remailer using the following template:
:: Encrypted: PGP -----BEGIN PGP MESSAGE----- <place encrypted output here> -----END PGP MESSAGE-----
- Then send it.
- The extra headers are called 'pseudoheaders' because they do not appear in the RFC 822 headers specification for email.
- Messages to Cypherpunk remailers may be layered so they route through several different Cypherpunk remailers to decrease the odds of anyone determining who the sender is.
- Some Cypherpunk remailers are also Mixmaster anonymous remailers and can split long Cypherpunk messages into Mixmaster packets and send them to the next remailer, if it also understands Mixmaster.
- Many Cypherpunk remailer users will repeat steps 1-4 to wrap their message in additional layers to route it through several remailers for additional privacy and security.
- Data privacy
- Traffic analysis
Howtos and Examples
- About.com: Send Email Anonymously — Chaining Remailers with PGP
- Anonymous.to: Cypherpunk Tutorial
- Feraga.com: Howto use a Type I Anonymous Remailer (link not active 12 May 2010, see archive version)
- Email Security, Bruce Schneier (ISBN 0-471-05318-X)
- Computer Privacy Handbook, Andre Bacard (ISBN 1-56609-171-3)
|This network-related software article is a stub. You can help Wikipedia by expanding it.|
|This security software article is a stub. You can help Wikipedia by expanding it.|