© 2003 by Michael Chesbro                       Artwork © 2003 by Tehya Sullivan

Anonymous E-mail

by Michael Chesbro

   Men are only truly free to speak their minds in open debate when they are also free to speak privately without fear of government surveillance and censorship.    E-mail is the greatest electronic surveillance system in use today! Whenever you send e-mail it passes through multiple systems on the way to its recipient. At any of these points along the way your message can be copied and read. It is very likely that your e-mail is in fact stored as a part of systems back-up and normal operating procedures. Furthermore anyone monitoring traffic through your e-mail hub or ISP (Carnivore/DCS1000) can easily gather information about you and those with whom you communicate. Whilst you may have nothing in particular to hide, the thought of someone keeping track of your private communications and associations can certainly be disturbing.

   There are many reasons one might wish to communicate anonymously. One main reason for using anonymous e-mail is to prevent disclosure of your association with another person or group. Even if you are using encrypted e-mail (and you certainly should be) the fact that you and I exchange two or three e-mail messages per week shows, at least, that we know each other and that we are maintaining an on-going correspondence about something.

   Whilst you may have nothing in particular to hide, the thought of someone keeping track of your private communications and associations can certainly be disturbing.    Perhaps you wish to make a comment about a controversial topic, but in today's hyper-sensitive, politically-correct climate even totally innocuous comments can result in harassment, e-mail flames, and public ridicule. Maybe you're a whistle blower, trying to report corruption, criminal activity or a safety issue but fear retaliation from those involved in these violations. Perchance you are critical of current government policies, but don't want Big Brother tracking your every move as a result of you expressing your criticism of those in power.

   Or maybe you believe in freedom of speech and understand that men are only truly free to speak their mind in open debate when they are also free to speak privately without fear of government surveillance and censorship.

Anonymous Remailers

   One way to safeguard your privacy and keep cyber-snoops out of your personal business is to send your e-mail through an anonymous remailer. A remailer is a computer system that takes any properly formatted message, strips off the identifying header information, and then forwards the body of the message on to the intended recipient.

To send a message through a Type I remailer you first must properly format your message so that the remailer knows how to handle the message once it receives it.

   Formatting a remailer message is very easy. To format your message, begin the very first line of the body of your e-mail message with a double colon (::). On the next line type the remailer command “Anon-To:” followed by the e-mail address of your intended recipient of the message. Now skip one line and type the text of your e-mail message. For example:

::
Anon-To: recipient@domain.com
   This is the text of your e-mail message. It will be received by the recipient on the Anon-To: line after it passes through the remailer.

   With some remailers you could simply send the above message to the remailer and it would be forwarded to the intended recipient after the remailer removed any identifying information about you from the message header. However, anyone monitoring your connection to your Internet Service Provider (ISP) would be able to read the text of your e-mail as well as the addressee on the Anon-To: line.

   To solve this problem many remailer operators added the ability to send encrypted mail to the remailer. Some remailers even require encrypted mail, rejecting any message that is not in encrypted format. Remailers use PGP (Pretty Good Privacy) as their standard encryption protocol. You can download a free copy of PGP from either the MIT Distribution Site at: http://web.mit.edu/network/pgp.html or from the PGP International Site http://www.pgpi.org.

   Once you have PGP and have a copy of the remailer's PGP public key, you simply prepare your message for anonymous remailing as previously discussed. Then encrypt your message using the remailer's PGP public key. Cut and paste the encrypted message into your e-mail program. Above this encrypted message we are going to add remailer instructions so that the remailer knows how to handle the message. First we add the double colon (::) to the first line of the body of the e-mail message, which tells the remailer that the next line is a remailer instruction. On the following line we insert the remailer command “Encrypted: PGP”. Skip one line and add the PGP encrypted text. For example:

::
Encrypted: PGP

-----BEGIN PGP MESSAGE-----
Version: PGP 8.0
hQCMAwYZB3EJfcr9AQP/Yj11a7+n069zXgV5dPtElvc1UHJseAuNK8tYJcZvx2vM
uF1rY7mpF19OCqZyIBXp6ifhN7s9/qSrvSRJ1odL2PM0a88KyVvMOPzP/AS0Yj62
fZVgSgCn3XkcHPLJ2RHAtttw7B47OW+ReyHKer8lYlugpmmRk1bY5K0lv2jeTguk
=mEqI
-----END PGP MESSAGE-----

   When the remailer receives this message it automatically decrypts it and follows the instructions in the enclosed message. Anyone monitoring your e-mail could only tell that you sent an encrypted message to an anonymous remailer. The content of your message and its intended recipient can not be determined by whoever is intercepting your e-mail. Remember you send all of your e-mail to the remailer's e-mail address. The remailer then removes any identifying information from your message and sends it on. Anyone monitoring your e-mail would only see encrypted messages going to remailers. He would have no way to determine the final recipient or the content of the message.

   Remailers come and go, but there are always several up and running somewhere on the Internet. One of the best places to get a copy of the current remailer list and statistics is from the EFGA web-site at: http://anon.efga.org/Remailers. This list is also posted on a daily basis to alt.privacy.anon-server. The following remailer list shows the top 10 remailers on a given day while this article was being written. You should always check for the current list on the day you plan to use a remailer.

remailer email address history latency up-time
shinn remailer@freedom.gmsociety.org ++-++++++-+* 35:53 100.00%
redneck config@redneck.gacracker.org ##+######### :49 100.00%
xgnym2 config@nym.xganon.com +#-*######## 3:36 99.99%
nym config@nym.alias.net #*-#*--#**## 29:37 99.99%
cfnym config@nym.cryptofortress.com ##+######### :44 99.99%
cripto anon@ecn.org *+-********* 11:27 99.99%
cthulu mixmaster@cthulu.joatcrafts.org +*-+*****-** 28:57 99.99%
xgmail config@mail.xganon.org +#+*######## 3:15 99.99%
blackhol config@blackhole.riot.eu.org ##-######### 1:31 99.98%
austria mixmaster@remailer.privacy.at ++-++++--+++ 1:02:19 99.98%

History key
# response in less than 5 minutes.
* response in less than 1 hour.
+ response in less than 4 hours.
- response in less than 24 hours.
. response in less than 2 days.
_ response in more than 2 days.

   While all Type I remailers function in the same basic way, you can obtain a detailed help file for a remailer by sending an e-mail message to the remailer with the subject line of “Remailer-Help.”

   Remailers can seem a little confusing for the first-time user, but are in fact very easy to use. You can practice using remailers by sending messages to yourself through the various remailers.

   To make the use of remailers even easier some of them have set up web-page interfaces allowing you to simply fill in a message form on-line and have it processed automatically through the remailer. This is not the most secure means of using a remailer, but it does allow you to send a message through a remailer without really knowing what you are doing. One such web-page interface to a remailer is at https://riot.eu.org/anon/remailer.html. Visit the Riot Remailer web-page and try it!

   The Riot Remailer actually uses Type II remailers called Mixmasters. Mixmaster remailers are much more secure than Type I remailers, but also require that you download software to use them. Mixmasters route your e-mail through multiple remailers, stripping off a layer of encryption at each stop until finally delivering the message to its intended recipient. I use both Cypherpunk remailers and Mixmasters to secure my personal e-mail. Both types increase your privacy and security and both have their place. If you are interested in Mixmaster remailers you can download the Mixmaster software at: http://sourceforge.net/projects/mixmaster/.

Private Idaho

   It would be nice if there was a program that automated working with remailers, making anonymous e-mail simply point-and-click. Thankfully there is such a program. It's called Private Idaho and is available in many places on the Internet. Private Idaho was written by Joel McNamara (http://www.eskimo.com/~joelm/pi.html) and although he no longer personally supports the program it is still very popular and supported by others. For example the current edition of Private Idaho can be downloaded from http://www.itech.net.au/pi/.

   If you use remailers on a regular basis you should certainly know how to format remailer messages by hand, but once you are confident in their use Private Idaho makes their use even easier.

Stealth Message

   Another excellent system for sending anonymous and secure messages is the Stealth Message system at http://www.stealthmessage.com. The Stealth Message system takes a different approach to e-mail. Instead of sending messages through an e-mail server, you access the Stealth Message web-page where you prepare and encrypt your message (using a script running on your computer/client side encryption). The Stealth Message system requires that you have arranged a password with the intended recipient of your message (the message will be encrypted with a password and the recipient will need to know this password in order to access the message). However, Stealth Message does not require that you establish an account or enter a “From” e-mail address. Additionally, Stealth Message lets you set self-destruct times on your e-mail messages so that even the recipient can't save the message, copy it, or forward it to others.

   Remailers are easy to use. They can be fun, and best of all, they enhance your privacy.    With Stealth Message the recipient of the message cannot reply to you by simply clicking the “reply” button (thereby creating an identifiable link for traffic analysis). Of course he can reply by creating his own original Stealth Message and sending it to you at your e-mail address.

   Stealth Message is an excellent tool for sending brief, secure messages.

ZipLip

   ZipLip, http://www.ziplip.com, allows you to establish a free, web-based e-mail account that gives you some degree of anonymity. When run in its secure mail mode, ZipLip's function is similar to Stealth Message in that it saves your message to a web-site where the recipient must access it (with the option of requiring a password).

   ZipLip uses client side encryption (encryption is accomplished on your computer) so the messages traveling across the Internet can only be read by their intended recipient (with knowledge of the password securing the message). The advantage of ZipLip (in secure mode) is that your e-mail messages do not pass through standard mail servers, as they will with other web-based e-mail services. This means that there is no copy of your message available to someone monitoring your e-mail hub.

   ZipLip, however, can also be run in a “standard e-mail” format where it works like any other web-based e-mail system (i.e., Hotmail). The standard e-mail format sacrifices security and anonymity, but may be of general use to anyone who would use a web-based e-mail account.

You have one more privacy tool in your inventory.

   If you are going to have a web-based e-mail account, the one to have is ZipLip. ZipLip security features along with the ability to operate in a standard (non-secure) mode makes ZipLip the ideal choice for a web-based e-mail service.

Conclusion

   In an article, it isn't possible to discuss every possible function of anonymous remailers and secure e-mail, but it is my hope that this article has provided you with one more tool you can use to safeguard your personal privacy and rightful liberties.

   Remailers are easy to use. They can be fun, and best of all they enhance your privacy. Begin by checking the current remailer list for the day. Then prepare a remailer message and send it to yourself through the remailer. (Remember, some remailers require PGP encrypted messages, but you can always download a free copy of PGP if you don't already have it.)

   Once you have successfully sent a message to yourself through a remailer, it's a simple matter to send messages to others in like manner, and you have one more privacy tool in your inventory.

Michael Chesbro has written several books on privacy and fraud. His book,Don't Be A Victim!, can be found in the Crime and Police Science section of our online catalog.

Loompanics Unlimited l 2003 Spring Supplement

Loompanics Unlimited Online Catalog
Order Toll-Free 1-800-380-2230, 24 hours a day, 7 days a week
YOUR ORDER IS SHIPPED WITHIN 24 HOURS OF RECEIPT!
(Monday Through Friday, 8am to 4 pm)