• Fw: Omnimix 2.8.1 Ormail

    From nobody@nobody@yamn.paranoici.org to comp.mobile.android on Sun Jul 13 21:54:31 2025
    From Newsgroup: comp.mobile.android

    On Sun, 13 Jul 2025 12:09:58 +0200, Fritz Wuehler <fritz@spamexpire-202507.rodent.frell.theremailer.net> wrote:
    Am 06.07.2025 um 22:58 schrieb Anonymous:
    Fritz Wuehler wrote:
    I have created an Ormail Account in Omnimix. Sending and receiving work. >>> I only want to send to another recipient. Where do I have to enter the
    address data for this? Thank you for your help.

    Go to Services > OrMail and click '+'.
    Enter the HS Address and Port you got from the recipient, the External
    Address you want her to see as To: address and a Local Address, which
    you intend to use in your mail client as To: address.
    Click the Accept button to close the window.
    Make sure the activation checkmark at Services > OrMail is set!
    Then go to the User tab, select your user entry and click '=' to open
    it.
    At the OrMail Recipients list set a checkmark for the Local Address item
    of your recipient to assign it to your user.
    Click the Accept button to close the window.
    Restart servers.
    Now each message with the recipient's Local Address term as its To:
    address sent by your user takes the OrMail route. The delivery will
    only succeed when at that moment the recipient's Hidden Service is
    online.

    I have made the settings according to the instructions. After that, >everything worked. However, the address of the recipient (.onion) was >apparently not always available? MailP > Ormail? Thanks for the answer
    and the help.

    (using Tor Browser 14.5.4) . . . *see note below https://www.danner-net.de/omom/tutortorplusmail.htm
    The major advantage of remailer networks is unpredictable latency at each server
    of the delivery chain, which renders correlation attacks useless, an important >contribution to its extremely reliable resistance against all kinds of attacks.
    But that latency may be intolerable with time-critical missions, where also the
    feedback of a successful transaction is mandatory, which remailers can't provide
    as well.
    That's where direct e-mail communication between sender and recipient through >the Tor network may be a viable solution.
    It gives you hidden end-to-end encrypted data transfers in realtime e.g. between
    OmniMix installations, which are connected by a circuit of up to 9 anonymizing >Tor nodes, without the need of an additional external mail server.
    Like anonymous remailing through the Mixmaster and Yamn network OrMail >integrates seamlessly into your mail management infrastructure. Use your standard
    mail client, which may already be configured to route all traffic through >OmniMix, and, based on an OrMail recipients list within OmniMix, matching mail is
    delivered directly through the Tor network and the destination's Tor Hidden >Service to its SMTP server. You only have to know the recipient's .onion address
    and the port number that service uses. From there the recipient's mail client >downloads stored messages with a POP3 command. Similar to its nym account >management OmniMix supports multiuser environments with OrMail as well, as for >each user multiple mail recipient ('To: header') patterns can be defined. >Furthermore you're not restricted in the number of separate Tor Hidden Services
    and thereby identities usable for different tasks.
    At first make sure that at the TorPlus > Server tab the OrMail SMTP server is >activated and running, indicated by a white background of the 'Port' field. If it
    remains grey even after a restart of the OmniMix servers there may be a port >conflict with that number already being occupied by another server, so try a >different one.
    Tutor_TorPlus_OrMail_Server
    Then go to the TorPlus > HSvcs tab to set up such a Hidden Service for incoming
    OrMail by clicking the '+' button to add a new item. >Tutor_TorPlus_OrMail_HS_Edit
    Create a new folder, where Tor deploys Hidden Service data like the .onion >address it computes at a later restart. Then enter a random external port number
    at 'Port Ext'. Better don't use a standard port, which is easier to detect by an
    adversary. Set 'Int Address' to '127.0.0.1' for the local computer as the device
    where the OrMail SMTP server resides, and enter its port number into the 'Port >Int' field.
    With a restart of the OmniMix servers and Tor the system is ready to receive >OrMail messages. That's when the Hidden Service's .onion address is created and
    gets visible at the AddrExt column of the Hidden Service table. A click on the >'*' button of the Hidden Services list now copies the complete OrMail address >looking like >'ormail2q4v4tsqtqludlts4cbmk5y5u2d74x6aus7tol642uxi2qh3yd.onion:54321' into the
    clipboard ready to be sent to your communication partner(s). >Tutor_TorPlus_OrMail_HS
    Now go to the 'User' Accounts tab, select your own user item (e.g. the >'OmniMix'/'omnimix' entry) and, for testing purposes, add a '^.*$' item, a >regular expression term for all possible addresses, to the 'OrMail Addresses' >list. Don't forget to set a check mark to activate that entry. >Tutor_TorPlus_OrMail_User_Edit
    At the 'MailP' POP3 client tab you finally have to activate OrMail polling >('optional' or 'mandatory') with POP3 downloads by mail clients.
    That's it at the receiving end. Now to the easier task at the sender. >Presuming that Tor is already running you first have to go to the Services > >OrMail tab, click the '+' button to add an item and define the OrMail recipient
    who gave you his Hidden Service .onion address with the associated port number by
    entering them at 'HS Address' and 'Port'. Select SSL/TLS 'enabled', as you can >expect the OmniMix SMTP server at the destination to support that data encryption
    method.
    Tutor_TorPlus_OrMail_Recipient_Edit
    Then at 'Local Address' enter a (short) unique describing term that you use as >the recipient's address in your mail client, and at 'External Address' the true
    address, by which your local term is overwritten before OmniMix forwards your >message. The name part outside the angle brackets isn't altered by OmniMix. >Caution: Never use potential real world mail addresses as local OrMail alias >addresses, as for security reasons even mail messages that match a deactivated >list entry are blocked.
    After closing that window check the activation box above the OrMail Recipients >list.
    Tutor_TorPlus_OrMail_Recipient
    Finally, back at the 'User' tab, activate that OrMail address at the 'OrMail >Recipients' list for your account as shown in the picture above to make it >available. Keep in mind that if OmniMix recognizes an OrMail recipient term, >which isn't unlocked for the respective user, the transmission of that message is
    aborted to avoid the leakage of information.
    [end quoted plain text]

    network eavesdropping is universal, continually monitoring every bit and byte of data being exchanged between user's devices, wifis, isps, internet, usenet, and whatever else they've "bugged" (some say appliances, automobiles, cameras, electronics, televisions and everything else george orwell forgot to mention), and that is why pseudonymous communications, "tor-mailers" etc., are promoted by troll farm operatives without any forewarning that, without the proper use of anonymous remailers (which most importantly automatically encrypt messages before sending them), tor-mailer users are strongly advised to consider whole message encryption <https://www.danner-net.de/omom/tutorwme.htm> first before losing patience in a system designed for the fox that's guarding the henhouse

    using anonymous remailers for posting anonymously to public usenet newsgroups is the surest way to avoid correlation attacks, with over 40,000+ unmoderated newsgroups to choose from, even clear text can be used to communicate in ways that could make it particularly challenging to associate readers with senders

    --- Synchronet 3.21a-Linux NewsLink 1.2