Nym server
|
A nym server (short for "pseudonym server") is a server that provides an untraceable e-mail address, such that neither the nym server operator nor the operators of the remailers involved can discover which nym corresponds to which real identity.
To set up a nym, one creates a PGP keypair and submits it to the nym server, along with instructions (called a reply block) to anonymous remailers on how to send a message to his real address. The nym server returns a confirmation through this reply block. He then sends a message to the address in the confirmation.
To send a message from the nym, one adds a few headers at the beginning, then signs it with his nym key and encrypts it to the nym server key. He sends it to the nym server, normally through anonymous remailers so that it cannot be traced. The nym server then sends it out, with the From: address being the nym.
When the nym server gets a message addressed to the nym, it appends it to the reply block for that nym and sends it to the first remailer in the chain. That remailer then sends it to the next, and so on until it reaches the user's real address. It is quite obviously good practice to add instructions to encrypt it on the way, so that the message one gets cannot be matched to the one the nym server sent by someone (or some organization) doing in/out traffic analysis.
See also
- Anonymous remailer
- Pseudonymous remailer
- Tor (Anonymous network)
- Anonymous_P2P
- data privacy
- identity theft
- penet remailer
- anonymity
- traffic analysis
- anonymous publication
- Onion Routing
External links
- a remailer FAQ (http://www.andrebacard.com/remail.html)
- Remailer Vulnerabilities (http://www.skuz.net/potatoware/PSKB-035.html)
- Mixmaster & Remailer Attacks (http://www.obscura.com/~loki/remailer/remailer-essay.html)
Further reading
- Email Security, Bruce Schneier (ISBN 047105318X)
- Computer Privacy Handbook, Andre Bacard (ISBN 1566091713)