Sujet : using anonymous remailers for posting to usenet
De : noreply (at) *nospam* dirge.harmsk.com (D)
Groupes : news.groupsDate : 07. Jul 2025, 01:08:08
Autres entêtes
Organisation : dizum.com - The Internet Problem Provider
Message-ID : <20250706.200808.12a0ccc4@dirge.harmsk.com>
overview headers on the <
news:alt.anonymous.messages> newsgroup are probably
the most authoritative examples of what headers of anonymous messages posted
to usenet should resemble . . . nothing unusual, no custom headers, strictly
encrypted content, typical exit remailer message ids, frell, paranoia, dizum,
("@nymserv.mixmin.net" stopped after 2025-03-29); "whole message encryption"
<
https://www.danner-net.de/omom/tutorwme.htm> is also considered very useful,
the omnimix tutorial is probably the best extant reference for serious users
of anonymous remailers . . . certainly other reputable sources are there too
(disreputable sources exist but are easily ignored, e.g. "tor-mailer" agents)
the majority of casual users of anonymous remailers routinely post cleartext
articles to usenet newsgroups by using a remailer client (omnimix, qsl, etc.)
to encrypt these messages before sending them, because network eavesdropping
is universal, and random remailer chains (e.g. * * * * * * * ) combined with
random copies etc. could make it a little more difficult for them to connect
or "correlate" the article's sender with that article's specific destination,
e.g., what newsgroup you posted it to and who has downloaded what you posted
anonymous remailers may not be failsafe, but to date, it's the best there is
in the public domain . . . tor is helpful but is pseudonymous, not anonymous