Cypherpunk anonymous remailer

Last updated

A Cypherpunk anonymous remailer , also known as a Type I remailer, is a type of anonymous remailer that receives messages encrypted with PGP or GPG, follows predetermined instructions to strip any identifying information, and forwards the messages to the desired recipient. [1]

Contents

Cypherpunk anonymous remailers are vulnerable to traffic analysis attacks, which take advantage of the predictable order in which messages are sent to recipients. This predictability can potentially reveal the identity of the sender. To address this weakness, Type II and Type III remailers were developed. [2] Prior to the introduction of Mixmaster (Type II) remailers, users attempted to mitigate this issue by sending messages in batches [3] or by using multiple remailers in sequence to further obscure the sender's identity. [4]

Mixmaster remailers were built upon the technology of Cypherpunk remailers, rendering the latter obsolescent. [5] However, there are still websites and systems which rely on the general ideas of layered encryption and identity obfuscation behind Type I remailers. [6]

History

The Cypherpunk movement emerged in the late 1980s and early 1990s, consisting of activists, cryptographers, and computer scientists who believed in the use of cryptography as a means to safeguard privacy and resist government interference. They played a crucial role in the development of privacy technologies, including remailers. [7]

Uses

While they are mostly considered obsolete due to the Mixmaster being the most common remailer type, Cypherpunk remailers are still applicable in niche applications for those who have no other accessible options. For example, sites that are censored or blocked by governments can use such remailers to circumvent this censorship. Cypherpunk remailers also require less setup and fewer resources to run, and can therefore be a suitable solution for those under time constraints or with few available assets.

See also

Notes

Further reading

Related Research Articles

<span class="mw-page-title-main">Email</span> Mail sent using electronic means

Email is a method of transmitting and receiving messages using electronic devices. It was conceived in the late–20th century as the digital version of, or counterpart to, mail. Email is a ubiquitous and very widely used communication medium; in current use, an email address is often treated as a basic and necessary part of many processes in business, commerce, government, education, entertainment, and other spheres of daily life in most countries.

A cypherpunk is one who advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk movement originated with the establishment of an electronic mailing list, through which informal groups sought to achieve privacy and security through proactive use of cryptography. The cypherpunk movement has been active since about 1990 at the latest.

Mixmaster is a Type II anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. It is an implementation of a David Chaum's mix network.

An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anonymous remailers, and nym servers, among others, which differ in how they work, in the policies they adopt, and in the type of attack on the anonymity of e-mail they can resist. Remailing as discussed in this article applies to e-mails intended for particular recipients, not the general public. Anonymity in the latter case is more easily addressed by using any of several methods of anonymous publication.

The Penet remailer was a pseudonymous remailer operated by Johan "Julf" Helsingius of Finland from 1993 to 1996. Its initial creation stemmed from an argument in a Finnish newsgroup over whether people should be required to tie their real name to their online communications. Julf believed that people should not—indeed, could not—be required to do so. In his own words:

A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a database of instructions on how to return messages to the real user. These instructions usually involve the anonymous remailer network itself, thus protecting the true identity of the user.

Various anti-spam techniques are used to prevent email spam.

<span class="mw-page-title-main">Onion routing</span> Technique for anonymous communication over a computer network

Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

Johan "Julf" Helsingius, born in 1961 in Helsinki, Finland, started and ran the Anon.penet.fi internet remailer.

Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message.

<span class="mw-page-title-main">Java Anon Proxy</span> Anonymity network

Java Anon Proxy (JAP) also known as JonDonym, was a proxy system designed to allow browsing the Web with revocable pseudonymity. It was originally developed as part of a project of the Technische Universität Dresden, the Universität Regensburg and Privacy Commissioner of the state of Schleswig-Holstein. The client-software is written in the Java programming language. The service has been closed since August 2021.

<span class="mw-page-title-main">Mixminion</span>

Mixminion is the standard implementation of the Type III anonymous remailer protocol. Mixminion can send and receive anonymous e-mail.

Email tracking or email tracker is a method for monitoring whether the email message is read by the intended recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the exact time and date when an email is received or opened, as well as the IP address of the recipient.

<span class="mw-page-title-main">Mix network</span> Routing protocol

Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as mixes which take in messages from multiple senders, shuffle them, and send them back out in random order to the next destination. This breaks the link between the source of the request and the destination, making it harder for eavesdroppers to trace end-to-end communications. Furthermore, mixes only know the node that it immediately received the message from, and the immediate destination to send the shuffled messages to, making the network resistant to malicious mix nodes.

Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer.

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header. Commercial anonymous proxies are usually sold as VPN services.

Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their personally identifiable information (PII), which is often provided to and handled by services or applications. PETs use techniques to minimize an information system's possession of personal data without losing functionality. Generally speaking, PETs can be categorized as either hard or soft privacy technologies.

<span class="mw-page-title-main">Hal Finney (computer scientist)</span> Cryptograph and cypherpunk

Harold Thomas Finney II was an American software developer. In his early career, he was credited as lead developer on several console games. He later worked for PGP Corporation. He was an early Bitcoin contributor, and received the first Bitcoin transaction from the currency's creator Satoshi Nakamoto.

Invisible mail, also referred to as iMail, i-mail or Bote mail, is a method of exchanging digital messages from an author to one or more recipients in a secure and untraceable way. It is an open protocol and its java implementation (I2P-Bote) is free and open-source software, licensed under the GPLv3.

References

  1. "Anonymous Remailers". mason.gmu.edu. Retrieved 2023-12-11.
  2. Van Oorschot, Paul C. (2 March 2023). "Anonymous remailers + secure email" (PDF). Archived from the original (PDF) on 2023-12-31.
  3. Anonymous Remailers. (n.d.). Retrieved August 10, 2023, from Archived 2021-09-24 at the Wayback Machine
  4. Remailers: Send Emails without Registration. (n.d.). Retrieved August 10, 2023, from Archived 2023-06-09 at the Wayback Machine
  5. Winkler, S., & Zeadally, S. (2015). An analysis of tools for online anonymity. International Journal of Pervasive Computing and Communications, 11(4), 436–453. Archived 2023-08-13 at the Wayback Machine
  6. Lutkevich, Ben (April 2021). "What is Obfuscation?".
  7. Assange, Julian (26 November 2012). Cypherpunks: Freedom and the Future of the Internet. OR Books. pp. 70–90. ISBN   978-1-939293-00-8.