Search the FAQ Archives

3 - A - B - C - D - E - F - G - H - I - J - K - L - M
N - O - P - Q - R - S - T - U - V - W - X - Y - Z
faqs.org - Internet FAQ Archives

APAS Anonymous Remailer Use [FAQ 4/8]: Remailer Details
Section - [FAQ 4.3] What is chaining? And what is a middleman?

( Part1 - Part2 - Part3 - Part4 - Part5 - Part6 - Part7 - Part8 - Single Page )
[ Usenet FAQs | Web FAQs | Documents | RFC Index | Houses ]


Top Document: APAS Anonymous Remailer Use [FAQ 4/8]: Remailer Details
Previous Document: [FAQ 4.2] How can I find more information about a remailer?
Next Document: [FAQ 4.4] Won't the first remailer in the chain know who I am?
See reader questions & answers on this topic! - Help others by sharing your knowledge
Before chaining one's messages one must have an understanding of
middleman remailers.  A middleman remailer ("middle" in its cap
string) is one that always adds another hop to any message that is not
already en route to another remailer. Example: If you send a message
to recipient <my_coworker@entrust.com> through middleman remailer
Georgia Cracker <remailer@gacracker.org>), Gacracker will send it to
say, <remailer@dizum.com>, with instructions to deliver to
<my_coworker@entrust.com>.

This behavior demonstrates what is known as smart middleman. All
Reliable <http://www.bigfoot.com/~potatoware/reli/> remailers that are
running in middleman mode are smart.Check the remailer-conf file to be
certain just what kind of middleman behavior to expect. Now, back to
chaining.

Chaining is using more than one remailer to send your encrypted
message. Basically, you send a message to remailer A with instructions
to send it to remailer B, which in turn finds instructions to send it
to remailer C, and so on, until the final recipient receives the
message. The intention is to obfuscate the origin of the email and/or
(with the help of encryption) the content of the message body. At any
given point on it's route, such a message will reveal only where it
came from and where it is going. If the message was not chained (only
one remailer was used) then that remailer operator or a successful
traffic analyst can know the true source AND destination of the
message. Not good.

User Contributions:

Comment about this article, ask questions, or add new information about this topic:




Top Document: APAS Anonymous Remailer Use [FAQ 4/8]: Remailer Details
Previous Document: [FAQ 4.2] How can I find more information about a remailer?
Next Document: [FAQ 4.4] Won't the first remailer in the chain know who I am?

Part1 - Part2 - Part3 - Part4 - Part5 - Part6 - Part7 - Part8 - Single Page

[ Usenet FAQs | Web FAQs | Documents | RFC Index ]

Send corrections/additions to the FAQ Maintainer:
turing+apas-user-faq@eskimo.com (Computer Cryptology)





Last Update March 27 2014 @ 02:12 PM