Pseudonymous remailer

A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a database of instructions on how to return messages to the real user. These instructions usually involve the anonymous remailer network itself, thus protecting the true identity of the user.

Primordial pseudonymous remailers once recorded enough information to trace the identity of the real user, making it possible for someone to obtain the identity of the real user through legal or illegal means. This form of pseudonymous remailer is no longer common.

David Chaum wrote an article in 1981 that described many of the features present in modern pseudonymous remailers.[1]

The Penet remailer, which lasted from 1993 to 1996, was a popular pseudonymous remailer.

Contemporary nym servers

[edit]

A nym server (short for "pseudonym server") is a server that provides an untraceable e-mail address, such that neither the nym server operator nor the operators of the remailers involved can discover which nym corresponds to which real identity.

To set up a nym, one creates a PGP keypair and submits it to the nym server, along with instructions (called a reply block) to anonymous remailers (such as Cypherpunk or Mixmaster) on how to send a message to one's real address. The nym server returns a confirmation through this reply block. One then sends a message to the address in the confirmation.

To send a message through the nym server so that the From address is the nym, one adds a few headers,[clarification needed] signs the message with one's nym key, encrypts it with the nym server key, and sends the message to the nym server, optionally routing it through some anonymous remailers. When the nym server receives the message it decrypts it and sends it on to the intended recipient, with the From address indicating one's nym.

When the nym server gets a message addressed to the nym, it appends it to the nym's reply block and sends it to the first remailer in the chain, which sends it to the next and so on until it reaches your real address. It is considered good practice to include instructions to encrypt it on the way, so that someone (or some organization) doing in/out traffic analysis on the nym server cannot easily match the message received by you to the one sent by the nym server.

Existing "multi-use reply block" nym servers were shown to be susceptible to passive traffic analysis with one month's worth of incoming spam (based on 2005 figures) in a paper by Bram Cohen, Len Sassaman, and Nick Mathewson.[2]

See also

[edit]

References

[edit]
  1. ^ Chaum, David (February 1981). "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms" (PDF). Communications of the ACM. 24 (2): 84–90. doi:10.1145/358549.358563. S2CID 30340230.
  2. ^ See The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval Len Sassaman and Bram Cohen and Nick Mathewson (November 2005). Sabrina De Capitani di Vimercati and Roger Dingledine (ed.). "The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval" (PDF). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005). ACM Press. doi:10.1145/1102199.1102201. S2CID 356770. Retrieved June 6, 2008.

Further reading

[edit]
[edit]