• using anonymous remailers for posting to usenet

    From noreply@noreply@dirge.harmsk.com to news.groups on Sun Jul 6 20:08:08 2025
    From Newsgroup: news.groups


    overview headers on the <news:alt.anonymous.messages> newsgroup are probably the most authoritative examples of what headers of anonymous messages posted to usenet should resemble . . . nothing unusual, no custom headers, strictly encrypted content, typical exit remailer message ids, frell, paranoia, dizum,
    ("@nymserv.mixmin.net" stopped after 2025-03-29); "whole message encryption" <https://www.danner-net.de/omom/tutorwme.htm> is also considered very useful, the omnimix tutorial is probably the best extant reference for serious users of anonymous remailers . . . certainly other reputable sources are there too (disreputable sources exist but are easily ignored, e.g. "tor-mailer" agents)

    the majority of casual users of anonymous remailers routinely post cleartext articles to usenet newsgroups by using a remailer client (omnimix, qsl, etc.) to encrypt these messages before sending them, because network eavesdropping is universal, and random remailer chains (e.g. * * * * * * * ) combined with random copies etc. could make it a little more difficult for them to connect or "correlate" the article's sender with that article's specific destination,
    e.g., what newsgroup you posted it to and who has downloaded what you posted

    anonymous remailers may not be failsafe, but to date, it's the best there is in the public domain . . . tor is helpful but is pseudonymous, not anonymous


    --- Synchronet 3.21a-Linux NewsLink 1.2