8. Anonymity, Digital Mixes, and Remailers


THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666, 1994-09-10, Copyright Timothy C. May. All rights reserved. See the detailed disclaimer.

8.2. SUMMARY: Anonymity, Digital Mixes, and Remailers

8.2.1. Main Points

8.2.2. Connections to Other Sections

8.2.3. Where to Find Additional Information

8.2.4. Miscellaneous Comments

8.3. Anonymity and Digital Pseudonyms

8.3.1. Why is anonymity so important?

8.3.2. What's the difference between anonymity and pseudonymity? + Not much, at one level...we often use the term "digital pseudonym" in a strong sense, in which the actual identity cannot be deduced easily

 - this is "anonymity" in a certain sense

8.3.3. Downsides of anonymity

8.3.4. "How will privacy and anonymity be attacked?"

8.3.5. "How will random accusations and wild rumors be controlled in anonymous forums?"

8.3.6. "What are the legal views on anonymity?"

8.3.7. Some Other Uses for Anonymous Systems:

8.3.8. "True Names"

8.3.9. Many ways to get pseudonyms:

8.3.10. "How is Pseudonymity Compromised?"

8.3.11. Miscellaneous Issues

8.4. Reasons for Anonymity and Digital Pseudonyms (and Untraceable EMail)

8.4.1. (Thre are so many reasons, and this is asked so often, that I've collected these various reasons here. More can be added, of course.)

8.4.2. Privacy in general

8.4.3. Physical Threats

8.4.4. Voting

8.4.5. Maintenance of free speech

8.4.6. Adopt different personnas, pseudonyms

8.4.7. Choice of reading material, viewing habits, etc.

8.4.8. Anonymity in Requesting Information, Services, Goods

8.4.9. Anonymity in Belonging to Certain Clubs, Churches, or Organizations

8.4.10. Anonymity in Giving Advice or Pointers to Information

8.4.11. Reviews, Criticisms, Feedback

8.4.12. Protection against lawsuits, "deep pockets" laws

8.4.13. Journalism and Writing

8.4.14. Academic, Scientific, or Professional

8.4.15. Medical Testing and Treatment

8.4.16. Abuse, Recovery

8.4.17. Bypassing of export laws

8.4.18. Sex groups, discussions of controversial topics

8.4.19. Avoiding political espionage

8.4.20. Controversial political discussion, or membership in political groups, mailing lists, etc.

8.4.21. Preventing Stalking and Harassment

8.4.22. pressure relief valve: knowing one can flee or head for the frontier and not be burdened with a past

8.4.23. preclude lawsuits, subpoenas, entanglement in the legal machinery

8.4.24. Business Reasons

8.4.25. Protection against retaliation

8.4.26. Preventing Tracking, Surveillance, Dossier Society

8.4.27. Some Examples from the Cypherpunks List

8.5. Untraceable E-Mail

8.5.1. The Basic Idea of Remailers

8.5.2. Why is untraceable mail so important?

8.5.3. How do Cypherpunks remailers work?

8.5.4. How, in simple terms, can I send anonymous mail?

8.5.5. Chaum's Digital Mixes

8.5.6. "Are today's remailers secure against traffic analysis?" - Mostly not. Many key digital mix features are missing, and the gaps can be exploited.

8.6. Remailers and Digital Mixes (A Large Section!)

8.6.1. What are remailers?

8.6.2. Cypherpunks remailers compared to Julf's

8.6.3. "How do remailers work?"

8.6.4. "What are some uses of remailers?"

8.6.5. "Why are remailers needed?"

8.6.6. "How do I actually use a remailer?"

8.6.7. Remailer Sites

8.6.8. "How do I set up a remailer at my site?"

8.6.9. "How are most Cypherpunks remailers written, and with what tools?"

8.6.10. Dealing with Remailer Abuse

8.6.11. Generations of Remailers

8.6.12. Remailer identity escrow

8.6.13. Remailer Features

8.6.14. Things Needed in Remailers

8.6.15. Miscellaneous Aspects of Remailers

8.7. Anonymous Posting to Usenet

8.7.1. Julf's penet system has historically been the main way to post anonymously to Usenet (used by no less a luminary than L. Detweiler, in his "an12070/S. Boxx" personna). This has particulary been the case with postings to "support" groups, or emotional distress groups. For example, alt.sexual.abuse.recovery.

8.7.2. Cryptographically secure remailes are now being used increasingly (and scaling laws and multiple jurisdictions suggest even more will be used in the future).

8.7.3. finger remailer.help.all@chaos.bsu.edu gives these results [as of 1994-09-07--get a current result before using!]

8.8. Anonymous Message Pools, Newsgroups, etc.

8.8.1. "Why do some people use message pools?"

8.8.2. alt.anonymous.messages is one such pool group

8.8.3. "Could there be truly anonymous newsgroups?"

8.9.1. What's the legal status of remailers?

8.9.2. "Can remailer logs be subpoenaed?"

8.9.3. How will remailers be harassed, attacked, and challenged?

8.9.4. "Can pressure be put on remailer operators to reveal traffic logs and thereby allow tracing of messages?"

8.9.5. Calls for limits on anonymity

8.9.6. Remailers and Choice of Jurisdictions

8.9.7. Possible legal steps to limit the use of remailers and anonymous systems

8.9.8. Crypto and remailers can be used to protect groups from "deep pockets" lawsuits

8.9.9. Could anonymous remailers be used to entrap people, or to gather information for investigations?

8.10. Cryptanalysis of Remailer Networks

8.10.1. The Need for More Detailed Analysis of Mixes and Remailers

8.10.2. A much-needed thing. Hal Finney has posted some calculations (circa 1994-08-08), but more work is sorely needed.

8.10.3. In particular, we should be skeptical of hand-waving analyses of the "it sure looks complicated to follow the traffic" sort. People think that by adding "messy" tricks, such as MIRVing messages, that security is increased. Maybe it is, maybe it isn't. But it needs formal analysis before claims can be confidantly believed.

8.10.4. Remailers and entropy

8.10.5. Scott Collins believes that remailer networks can be cryptanalyzed roughly the same way as pseudorandom number generators are analyzed, e.g., with dynamic Markov compressors (DNCs). (I'm more skeptical: if each remailer is using an information-theoretically secure RNG to reorder the messages, and if all messages are the same size and (of course) are encypted with information-theoretically secure (OTP) ciphers, then it seems to me that the remailing would itself be information-theoretically secure.)

8.11. Dining Cryptographers

8.11.1. This is effectively the "ideal digital mix," updated from Chaum's original hardware mix form to a purely software-based form.

8.11.2. David Chaum's 1988 paper in Journal of Crypology (Vol 1, No

  1. outlines a way for completely untraceable communication using only software (no tamper-resistant modules needed)
    • participants in a ring (hence "dining cryptographers")

8.11.3. What "DC-Net" Means

8.12. Future Remailers

8.12.1. "What are the needed features for the Next Generation Remailer?"

8.12.2. Remailing as a side effect of mail filtering

8.12.3. "Are there any remailers which provide you with an anonymous account to which other people may send messages, which are then forwarded to you in a PGP-encrypted form?" Mikola Habryn, 94-04

8.12.4. "Remailer Alliances"

8.13. Loose Ends

8.13.1. Digital espionage

8.13.2. Remailers needs some "fuzziness," probably

8.13.3. Trying to confuse the eavesdroppers, by adding keywords they will probably pick up on

8.13.4. Restrictions on anonymous systems


Revision #3
Created 23 June 2022 03:47:30 by c0mmando
Updated 23 June 2022 03:51:15 by c0mmando