Email / Post to USENET Using GPG Encrypted Remailer

Discussion in 'Keeping Your Anonymity In Iran' started by Unregistered, Jun 26, 2009.

  1. Truncated Instructions if Google not Available

    How to post to Google Groups (old USENET) and send email anonymously
    using GPG encryption and anonymous remailer chains (see also
    How to Send an Anonymous Email Message - About Email). If done
    thoughtfully and carefully, this provides a Twitter-like
    communications capability but with a secure (encrypted), anonymous
    email channel and no character limit.

    1. Secure Your Message
    1.0 Write your message using your text editor in the file, say,
    message.txt. Import any photos using the ASCII output from the
    uuencode command, which looks like this on Linux:
    % uuencode -o photo.txt my_source_photo_file.jpg my_destination_photo_name.jpg
    1.1 Format your unencrypted for transmission using an anonymous
    remailer chain
    (How to Send an Anonymous Email Message - About Email,
    Cypherpunk Anonymous Remailer Tutorial,
    Bananasplit Website - Mail2News Gateway,
    [FAQ 3.3] What is a Cypherpunk Remailer?....). If
    you want to post to the USENET group soc.culture.iranian on the date
    2009-06-24, your message should look like this. Use this exact format
    -- any mistake in your formatting and the remailer will not know how
    to read or send your message. The Latent-Time field (hr:mn format,
    with a 'r' added for a random time between 0:00 and the time you
    specify) adds some extra time before your message is sent to hinder
    traffic analysis (comparing when your message was sent, which can be
    determined, from when it appears, which may be determined) -- use
    different amounts of time for each message.
    ------------------ begin message.txt ------------------
    Latent-Time: +0:01r
    Subject: An informative subject with hash tags (#iranelection #neda)
    Type your message your here, perhaps with hash tags (#iranelection
    #neda). Small photo attachments can be included using the uuencode-d
    ASCII text from the file photo.txt above:
    begin 644 my_destination_photo_name.jpg
    ------------------- end message.txt -------------------
    1.2 Encryption Chain for Anonymous Remailers
    1.2.1 First Encryption. The message above will be emailed and posted
    anonymously when it is sent to one of the anonymous remailers, BUT IT
    IS NOT SECURE -- anyone monitoring your internet connection can
    intercept it. To securely encrypt your message, you'll need to use the
    public key from one of the anonymous remailers to which you will email
    your message. Look at the most recent remailer reliability statistics
    (Google "Remailer Reliability Stats", Cypherpunk Remailers [noreply],
    Cypherpunk Remailers [Randseed Pinger]), choose a reliable one
    based upon (1) the flag pgponly in their $remailer properties list;
    (2) their previous history. Retrieve the remailer's key by sending
    it the email, say:
    Subject: remailer-key
    <No body>
    Some remailer choices are:
    If the remailer is up, you should receive, probably in a few seconds
    to a few hours, the message:
    ------------------ begin text ------------------
    $remailer{"cyberiad"} = "<> cpunk max mix pgp pgponly repgp remix latent hash cut test ek ekx esub inflt50 rhop5 reord post";
    Here is the RSA PGP key:
    Type Bits/KeyID * * Date * * * User ID
    pub *1024R/7DFEC1B9 2006-09-11 Anonymous Remailer <>
    Version: Mixmaster 3.0b2 (OpenPGP module)
    Here is the DSA PGP key:
    *. . . . . . . . . . . . . . . . . . . . . . . .
    ------------------- end text -------------------
    The "PGP PUBLIC KEY BLOCK" is the digital key you will use to "lock"
    (encrypt) your message. The remailer has a secret, unique, tightly
    held, PRIVATE key block that is the only key that can be used to
    "unlock" (decrypt) your message. This remailer uses a 1024 bit key,
    which is very difficult to break. Save the remailer's email reply to a
    file, say, key.txt.
    Now use GPG to import the remailers key into your keychain and encrypt
    your message to send to the remailer with the
    (Linux) command:
    % gpg --import key.txt
    % gpg -ea --recipient --output message.txt.gpg message.txt
    (Answer 'y' to the GPG queries about the authenticity of the key if
    you obtained it over an anonymous proxy.) The only people that will be
    able to decrypt this encrypted message are those who have access to
    the remailer's *private* key (*not* the public key that you just used
    to encrypt, or someone who has the resources to break this
    cryptographically strong PGP code.) If you use two or more remailers,
    no remailer will be able to determine simultaneously the source of the
    message and its content, and only the last remailer in the chain will
    have access to the message itself.
    1.2.2 First Remailer Message. Format your encrypted message to send to
    the anonymous remailer. You should *only* use remailers that accept
    "pgponly" -- any unencrypted email sent to these remailers will be
    ignored. *The message body to the pgponly remailer (in this case should look like:
    ------------------ begin message.txt ------------------
    Encrypted: PGP
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1.4.3 (GNU/Linux)
    -----END PGP MESSAGE-----
    ------------------- end message.txt -------------------
    1.2.3 Second Encryption. For additional security, you can repeat the
    first encryption process with a *second* independent, anonymous
    remailer, preferably from another country. Your encrypted message will
    first be sent to the second remailer, decrypted by it, (revealing the
    encrypted text above for the first remailer), sent to the first
    remailer, decrypted, then sent to your original Anon-To: recipient, in
    this case a mail2news gateway that will result in a post on Google
    Groups. This second encryption process can be repeated the third,
    fourth, etc. time, but a remailer chain more than two or three links
    long is more likely to break, resulting in the loss of your message,
    and will have a longer latency. For the second encryption, choose
    another remailer, say,, get their key, import it
    to your keychain, and encrypt the following message, pasted from the
    one immediately above:
    ------------------ begin message.txt ------------------
    Latent-Time: +0:02r
    Encrypted: PGP
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1.4.3 (GNU/Linux)
    -----END PGP MESSAGE-----
    ------------------- end message.txt -------------------
    % gpg --import key.txt
    % gpg -ea --recipient --output message.txt.gpg message.txt
    1.2.4 Second Remailer Message. Format your encrypted message to send
    to the second anonymous remailer, in this example to The email message should look like:
    Subject: <empty>
    ------------------ begin body ------------------
    Encrypted: PGP
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1.4.3 (GNU/Linux)
    -----END PGP MESSAGE-----
    ------------------- end body -------------------
    2. From your mail server across an anonymous proxy server, email the
    encrypted message you created in step 1.2.4. If you formatted
    everything correctly and the remailers and mail2news gateway are up,
    your message should appear after the cumulative latency that you
    specified in your encrypted messages.
    This post was generated in exactly this way, which, if you are reading
    it, is proof that it works.
  2. White space important

    The reader ate all the white space, which is important for the directives to the remailer! The :: and ## directives in the examples above must all be followed by a blank line or more like this. Do not send a ## Subject: line to a pgponly remailer -- the remailer will ignore the message.

    Latent-Time: +0:01r

    Subject: An informative subject with hash tags (#iranelection #neda)

    Encrypted: PGP


Share This Page

Customize Theme Colors


Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins