PREV Remailer Security UP Remailer Support NEXT Remailer Tips

3.9: Verifiable Pseudonyms

Here is a plausible sequence of operations when using the remailer support in Mailcrypt:

  1. You create a public/private PGP key pair. You give it a User ID which is your pseudonym. You upload the public key to the key servers or otherwise distribute it. (Be aware that anyone who compromises your account can read the IDs on your secret keyring, thus discovering your verifiable pseudonyms.)
  2. You compose an Email message, Email reply, news post, or news followup.
  3. You insert your pseudonym with C-c / p.
  4. (Optional) You insert your response block with C-c / b.
  5. You type C-c / s to sign the message. The mc-sign function understands pseudonyms.
  6. You type C-c / r to rewrite the message for remailing. (Or use C-u C-c / r to view each step of the rewriting as it happens.)
  7. You type C-c C-c to send the message.

Now the recipient(s), reading your message through mail or news, can verify your pseudonymous signature; thus you have started to create a verifiable pseudonymous identity. If you use it consistently, it will develop a reputation of its own. With Mailcrypt, using a pseudonym is almost as easy as using your real name (and your followups in news will even thread properly). Welcome to the new age of letters...

PREV Remailer Security UP Remailer Support NEXT Remailer Tips