OmniMix • Tutorial • Nyms |
--------------------------------------------------------------------------------
::
Anon-To: remailer@pseudo.borked.net
Latent-Time: +1:00
Encrypt-CAST: wiRtSGTmqPEFM+elVgJP9uQTIT1TdkA2tYaLD5hf2rU
::
Encrypted: PGP
-----BEGIN PGP MESSAGE-----
Version: N/A
hQCMAzsxltkRUbsJAQQAkHxTq2gLQ4hCXcD06fFzLpFVma9lnnWGyFIq9MeXk+YG
JkdqR82uHOGzTyg7je8qtJ1xt6asx0USqECG9KFxU5Jg8mVYqUik7BLAQTFzUC5W
...
5/3FLRI+Z7pe71YbySmHrm6H5Ndd7WAxD+bKtOjqe2uZ+yVjIy3huKkIXm5COsu8
mV496t7HuieiOutEQY9E0UppwQAkXCFKR3bWRZzvRwK598Ao3xJVW+Z+CoHGt+41
pm8q0Y5+uA==
=SEvs
-----END PGP MESSAGE-----
**
From: John Doe <john.doe@domain.net>
To: whopper@my_nymserver.net
Subject: Greetings
Hi Jack,
how are you?
--------------------------------------------------------------------------------
• | Passphrase for the asymmetrical PGP public/private key pair of the nym. |
• | Seed for the series of passphrases needed as arguments for the 'Encrypt-Subject' and 'Encrypt-CAST' commands within the reply block(s) (more information on that topic in the chapter 'Passphrase creation for reply blocks'). |
• | Subject of the reply mail which is defined in the innermost reply block and encrypted with the 'Encrypt-Subject' (esub) command before delivery. |
--------------------------------------------------------------------------------
::
Anon-To: mail2news@dizum.com, mail2new@m2n.mixmin.net, mail2news@anon.lcs.mit.edu
Latent-Time: +0:30
Encrypt-CAST: e3ciyB32gzAzeGI77vXcuJ6oWQVNOTvQaZpgeMuLJus
Encrypt-Subject: gVcdbc9KC71M3/lnrVTKY03X/FIxwQW0JzQhCEcbodY
##
Newsgroups: alt.anonymous.messages
Subject: HDDXyoDRb/xmBdXPwMGcpOs42ZRvZyQwHsuIc2e5syP
--------------------------------------------------------------------------------
Cypherpunk Latent-Hist Latent Uptime-Hist Uptime Options
------------------------------------------------------------------------
borked 00B200000000 :13 ++++++++++++ 100.0% PR GO ATLEUIN9
dingo 000000000000 :07 ++++++++++++ 99.5% DPRHGOXATLEUIN9
twisty 000000000000 :06 ++++++++++++ 100.0% PRHGOXATLEUIN9
...
Remailer-Capabilities:
$remailer{"borked"} = " cpunk max mix pgp pgponly repgp remix latent hash cut test ek ekx esub inflt50 rhop5 reord post klen1024";
$remailer{"dingo"} = " cpunk mix hybrid middle pgp pgponly latent ek ekx esub cut hash post repgp remix reord ext max test inflt50 rhop5 klen1000";
$remailer{"twisty"} = " cpunk mix hybrid pgp pgponly latent ek ekx esub cut hash post repgp remix reord ext max test inflt75 rhop5 klen1000";
...
Make sure, that all remailers you define for reply chains allow at least |
|
L | latent (Supports the Latent-Time directive) |
E | ekx (Supports Encrypt-3DES,-CAST directives) |
and the last one additionally |
|
U | esub (Supports the Encrypt-Subject directive) |
but not |
|
D | middle (Remailer is middleman only and chains to other remailers) |
and, if you intend to post directly to a newsgroup without involving a mail2news gateway |
|
P | post (Supports news posting (Anon-Post-To or Post)) |
• | green | P | (post) | Not as exit with direct newsgroup posting. Selected as final remailer, they need the definition of a mail2news gateway. |
• | yellow | DU | (middle / esub) | Useless as exit remailer. |
• | red | LE | (latent / ekx) | Useless for any reply block. |
• | blue | ? | Unknown, no data available. |
• | white | 100 | % | |
• | green | >= | 98 | % |
• | yellow | >= | 95 | % |
• | orange | >= | 90 | % |
• | red | < | 90 | % |
• | blue | unknown |
Though middleman-only remailers have to be avoided as exit hops, in case of 'dingo' this restriction only applies to the delivery of mail, whereas it's able to post news messages directly and even through some mail2news gateways specified in its config file. The NoReply Thesaurus offers you an insight in those config files and other important information on every single remailer.
To filter out the messages meant for you, you have to check for every message in the newsgroup, whether a decoding of its encrypted subject with the concerning 'Encrypt-Subject' passphrase of one of your nyms leads to the original subject. All messages that meet this condition have to be downloaded, and the decryption of their bodies presents the mails your nym server originally received for your account.With a sufficient transfer capacity and speed of your Internet connection you should consider installing a local news server like Hamster and configure it to download all available messages. Then make OmniMix get all its nym data from there. This way an adversary is kept from finding out any relevant access information that may weaken the security of your nym activities.
At all those more or less complicated and time-consuming proceedings you are supported by OmniMix.