Remailer Security
Remailer Support
Remailer Tips
3.9: Verifiable Pseudonyms
Here is a plausible sequence of operations when using the remailer
support in Mailcrypt:
-
You create a public/private PGP key pair. You give it a User ID which
is your pseudonym. You upload the public key to the key servers or
otherwise distribute it. (Be aware that anyone who compromises your
account can read the IDs on your secret keyring, thus discovering your
verifiable pseudonyms.)
-
You compose an Email message, Email reply, news post, or news followup.
-
You insert your pseudonym with C-c / p.
-
(Optional) You insert your response block with C-c / b.
-
You type C-c / s to sign the message. The
mc-sign
function
understands pseudonyms.
-
You type C-c / r to rewrite the message for remailing. (Or use
C-u C-c / r to view each step of the rewriting as it happens.)
-
You type C-c C-c to send the message.
Now the recipient(s), reading your message through mail or news, can
verify your pseudonymous signature; thus you have started to create a
verifiable pseudonymous identity. If you use it consistently, it will
develop a reputation of its own. With Mailcrypt, using a pseudonym is
almost as easy as using your real name (and your followups in news
will even thread properly). Welcome to the new age of letters...
Remailer Security
Remailer Support
Remailer Tips