• using anonymous remailers for posting to usenet

    From J@J@M to comp.misc on Mon Jul 7 19:55:11 2025
    From Newsgroup: comp.misc


    overview headers on the <news:alt.anonymous.messages> newsgroup are probably the most authoritative examples of what headers of anonymous messages posted
    to usenet should resemble . . . nothing unusual, no custom headers, strictly encrypted content, typical exit remailer message ids, frell, paranoia, dizum, ("@nymserv.mixmin.net" stopped after 2025-03-29); "whole message encryption" <https://www.danner-net.de/omom/tutorwme.htm> is also considered very useful, the omnimix tutorial is probably the best extant reference for serious users
    of anonymous remailers . . . certainly other reputable sources are there too (disreputable sources exist but are easily ignored, e.g. "tor-mailer" agents)

    the majority of casual users of anonymous remailers routinely post cleartext articles to usenet newsgroups by using a remailer client (omnimix, qsl, etc.) to encrypt these messages before sending them, because network eavesdropping
    is universal, and random remailer chains (e.g. * * * * * * * ) combined with random copies etc. could make it a little more difficult for them to connect or "correlate" the article's sender with that article's specific destination, e.g., what newsgroup you posted it to and who has downloaded what you posted

    anonymous remailers may not be failsafe, but to date, it's the best there is
    in the public domain . . . tor is helpful but is pseudonymous, not anonymous

    --- Synchronet 3.21a-Linux NewsLink 1.2