Verifiable Pseudonyms
Remailer Support
3.10: Remailer Tips
This is a collection of tips for using Mailcrypt's remailer support.
-
Read and understand the `
.remailers
' file. If the service at
kiwi.cs.berkeley.edu is gone by the time you read this, track down a
comparable service elsewhere. (Ask around in
`news:alt.privacy.anon-server
' or, as a last resort,
`news:alt.security.pgp
'.) Check the documentation (C-h v)
for the variable mc-levien-file-name
for a description of Levien
format.
-
The relevant remailer properties are
pgp
(required), hash
(required if you use hashmark headers), and post
(required for
posting to USENET). Remailers which do not support PGP won't even show
up in the completion list.
-
The only remailer which needs special properties (e.g., posting,
hashmarks, pseudonym support) is the last one in a chain. Any remailer
can be used at the beginning or in the middle. So if you find a few
remailers which support the feature(s) you require, and you always use
them at the end of your chains, then you can be confident that even the
longest chains will work.
-
If you update your `
~/.remailers
' file, you can reread it with
M-x mc-reread-levien-file.
-
Remember the natural order of operations. First you compose your
message. Then you insert your pseudonym with C-c / p. Then you
insert your response block with C-c / b. Then you sign (C-c / s) or sign and encrypt (C-c / e) the message. Then you rewrite it
for a remailer or chain (C-c / r). Then you send it. All but the
first and last two of these are optional. (Well, strictly speaking,
they are all optional, but you get the idea.)
-
Find and read some of the excellent remailer documentation available on
the Internet. For some good starting points, see References.
Verifiable Pseudonyms
Remailer Support