Are you Interested in Generating Some Extra Cash?


What is `anonymous mail'?

One approach to `anonymizing' mail has been to set up an `anonymous server' that, when activated by email to its address, responds by allocating and supplying an `anonymous ID' that is unique to the person requesting it (based on his email address). This will vary for the same person for different machine address email originations. To send anonymous mail, the user sends email directed to the server containing the final destination. The server `anonymizes' the message by stripping of identification information and forwards the message, which appears to originate from the anonymous server only from the corresponding anonymous user id. This is the `interactive' use of anonymity or pseudonymity mentioned above.

Another more `fringe' approach is to run a `cypherpunk' remailer from a regular user account (no root system privileges are required). These are currently being pioneered by Eric Hughes and Hal Finney . The operator runs a process on a machine that anonymizes mail sent to him with certain characteristics that distinguish it from his regular incoming mail (typically fields in the header). One has been implemented as a PERL script running on UNIX. Several of these are in existence currently but sites and software currently somewhat unstable; they may be in operation outside of system administrator knowledge. The remailers don't generally support anonymous return addresses. Mail that is incorrectly addressed is received by the operator. Generally the user of the remailer has to disavow any responsibility for the messages forwarded through his system, although actually may be held liable regardless.

These approaches have several serious disadvantages and weaknesses:

  1. The anonymous server approach requires maintaining a mapping of anonymous ID's to real addresses that must be maintained indefinitely. One alternative is to allow `deallocation' of aliases at the request of the user, but this has not been implemented yet.
  2. Although an unlikely scenario, traffic to any of these sites could conceivably be monitored from the `outside', necessitating the use of cryptography for basic protection,.
  3. Local administrators can shut them down either out of caprice or under pressure from local, network, or government agencies.
  4. Unscrupulous providers of the services can monitor the traffic that goes through them.
  5. Some remailers keep logs that may be inspected.
  6. The cypherpunk approach tends to be highly unstable because these operators are basically network users who do not own the equipment and are accountable to their own system administrators, who may be unaware of the use and unsympathetic to the philosophy of anonymity when the operation is discovered, regarding it as illicit use.
  7. In all cases, a high degree of trust is placed in the anonymous server operator by the user.

Currently the most direct route to anonymity involves using SMTP protocols to submit a message directly to a server with arbitrary field information. This practice, not uncommon to hackers, and the approach used by remailers, is generally viewed with hostility by most system administrators. Information in the header routing data and logs of network port connection information may be retained that can be used to track the originating site. In practice, this is generally infeasible and rarely carried out. Some administrators on the network will contact local administrators to request a message be tracked and its writer admonished or punished more severely (such as revoking the account), all of this actually happening occasionally but infrequently.

What is `anonymous posting'?

Anonymous servers have been established as well for anonymous Usenet posting with all the associated caveats above (monitored traffic, capricious or risky local circumstances, logging). Make sure to test the system at least once by e.g. anonymous posting to misc.test (however some operators don't recommend this because many sites `autorespond' to test messages, possibly causing the anonymous server to allocate anonymous IDs for those machines).

Another direct route involves using NNTP protocols to submit a message directly to a newserver with arbitrary field information. This practice, not uncommon to hackers, is also generally viewed with hostility by most system administrators, and similar consequences can ensue.

See also:

  1. Anonymity on the Internet FAQ, rtfm.mit.edu: /pub/usenet/news.answers/net-anonymity.
  2. ``Censorship Fights Heat Up on Academic Networks'', W. M. Bulkeley, Wall St. Journal, May 24 1993 p. B1.
  3. ``A Computer Program That Can Censor Electronic Messages Sets Off a Furor'', D. L. Wilson, Chronicle of Higher Education, May 12, 1993 p. A25.
  4. Information Week, May 31 1993 pg. 84 summarizes the Wall St. Journal article.

Why is anonymity (un)stable on the internet?

As noted, many factors compromise the anonymity currently available to the general internet community, and these services should be used with great caution. To summarize, the technology is in its infancy and current approaches are unrefined, unreliable, and not completely trustworthy. No standards have been established and troubling situations of loss of anonymity and bugs in the software are prevalent. Here are some encountered and potential bugs:

  1. One anonymous remailer reallocated already allocated anonymous return addresses.
  2. Others passed signature information embedded in messages unaltered.
  3. Address resolution problems resulting in anonymized mail bounced to a remailer are common.
  4. Forgeries to the anonymous server itself are a problem, possibly allowing unauthorized users to potentially glean anon ID - email address mappings in the alias file. This can be remedied with the use of passwords.
  5. Infinite mail loops are possible with chaining remailers.

Source code is being distributed, tested, and refined for these systems, but standards are progressing slowly and weakly. The field is not likely to improve considerably without official endorsement and action by network agencies. The whole idea is essentially still in its infancy and viewed with suspicion and distrust by many on the internet, seen as illegitimate or favorable to criminality. The major objection to anonymity over regular internet use is the perceived lack of `accountability' to system operators, i.e. invulnerability to account restrictions resulting from outside complaints. System adminstrators at some sites have threatened to filter anonymous news postings generated by the prominent servers from their redistribution flows. This may only have the effect of encouraging server operators to create less characteristically detectable headers. Probably the least problematic approach, and the most traditional to Usenet, is for individual users to deal with anonymous mail however they prefer, e.g. ignoring it or filtering it with kill files.

What is the future of anonymity on the internet?

New anonymous protocols effectively serve to significantly increase safeguards of anonymity. For example, the same mechanism that routes email over multiple hosts, thereby threatening its privacy, can also be used to guarantee it. In a scheme called `chaining' an anonymous message is passed through multiple anonymous servers before reaching a destination. In this way generally multiple links of the chain have to be `broken' for security to be compromised. Re-encryption at each link makes this scenario even more unlikely. Even more significantly the anonymous remailers could be spread over the internet globally so that local weaknesses (such as corrupt governments or legal wiretapping within a nation) would be more unlikely to sacrifice overall security by message tracing. However, remailers run by corrupt operators are possible.

The future of anonymous services on the internet is, at this time, highly uncertain and fraught with peril. While specific groups seem to benefit significantly from anonymous posting capabilities, many feel that unlimited newsgroup scope for anonymous posting is a disruptive and dangerous idea and detracts from discussions in `serious' groups. The introduction of unlimited group anonymity may have fundamental repercussions on Usenet conventions and distribution mechanisms such as moderated and `alt' groups have had in the past. For example, as part of new group creation, the charter may specify whether `anonymous' posting is (un)welcome.

Nevertheless, the widespread introduction and use of anonymity may be inevitable. Based on traffic statistics, anonymous services are in huge demand. Pervasive and readily available anonymity could carry significant and unforeseen social consequences. However, if its use is continued to be generally regarded as subversive it may be confined to the underground. The ramifications of the widespread introduction of anonymity to Usenet are still largely unknown. It is unclear whether it will provoke signficant amounts of new traffic or, instead of expansion, cause a shift where a greater portion of existing traffic is anonymized. Conceivably the services could play a role in influencing future mainstream social acceptance of Usenet.