<html><head><TITLE>Remailer list</TITLE></head>

<body bgcolor="#000000" text="#FFFFFF" link="#4040FF"
vlink="#C020F0"><H1>Remailer list</H1>

Check here to see why this page has a <a
href="http://www.vtw.org/speech/">black background</a>.

<P>
This is an automatically generated listing of remailers. The first
part of the listing shows the remailers along with configuration
options and special features for each of the remailers. The second
part shows the 12-day history, and average latency and uptime for each
remailer. You can also get this list by fingering
remailer-list@kiwi.cs.berkeley.edu.

<P> This is a more or less comprehensive list of the type-1 remailers.
Here are their <A
HREF="http://kiwi.cs.berkeley.edu/pgpkeys">pgpkeys</A>. For
information about the Mixmaster (also known as type-2) remailers, see
the <A HREF="http://kiwi.cs.berkeley.edu/mixmaster-list.html">
Mixmaster list</A>.

<PRE>
$remailer{"extropia"} = "&lt;remail@miron.vip.best.com&gt; cpunk pgp special";
$remailer{"portal"} = "&lt;hfinney@shell.portal.com&gt; cpunk pgp hash";
$remailer{"alumni"} = "&lt;hal@alumni.caltech.edu&gt; cpunk pgp hash";
$remailer{"bsu-cs"} = "&lt;nowhere@bsu-cs.bsu.edu&gt; cpunk hash ksub";
$remailer{"c2"} = "&lt;remail@c2.org&gt; eric pgp hash reord";
$remailer{"penet"} = "&lt;anon@anon.penet.fi&gt; penet post";
$remailer{"hacktic"} = "&lt;remailer@utopia.hacktic.nl&gt; cpunk mix pgp hash latent cut post ek";
$remailer{"flame"} = "&lt;remailer@flame.alias.net&gt; cpunk mix pgp. hash latent cut post reord";
$remailer{"rahul"} = "&lt;homer@rahul.net&gt; cpunk pgp hash filter";
$remailer{"mix"} = "&lt;mixmaster@remail.obscura.com&gt; cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"ford"} = "&lt;remailer@bi-node.zerberus.de&gt; cpunk pgp hash ksub ek";
$remailer{"vishnu"} = "&lt;mixmaster@vishnu.alias.net&gt; cpunk mix pgp hash latent cut ek ksub reord";
$remailer{"robo"} = "&lt;robo@c2.org&gt; cpunk hash mix";
$remailer{"replay"} = "&lt;remailer@replay.com&gt; cpunk mix pgp hash latent cut post ek";
$remailer{"spook"} = "&lt;remailer@spook.alias.net&gt; cpunk mix pgp hash latent cut ek reord";
$remailer{"rmadillo"} = "&lt;remailer@armadillo.com&gt; mix cpunk pgp hash latent cut ek";
$remailer{"ecafe"} = "&lt;cpunk@remail.ecafe.org&gt; cpunk mix";
$remailer{"wmono"} = "&lt;wmono@valhalla.phoenix.net&gt; cpunk mix pgp. hash latent cut";
$remailer{"shinobi"} = "&lt;remailer@shinobi.alias.net&gt; cpunk mix hash latent cut ek reord";
$remailer{"amnesia"} = "&lt;amnesia@chardos.connix.com&gt; cpunk mix pgp hash latent cut ksub";
$remailer{"gondolin"} = "&lt;mix@remail.gondolin.org&gt; cpunk mix pgp hash latent cut ek reord";
$remailer{"tjava"} = "&lt;remailer@tjava.com&gt; cpunk mix pgp hash latent cut";
$remailer{"pamphlet"} = "&lt;pamphlet@idiom.com&gt; cpunk pgp hash latent cut ?";
$remailer{'alpha'} = '&lt;alias@alpha.c2.org&gt; alpha pgp';
$remailer{'gondonym'} = '&lt;alias@nym.gondolin.org&gt; alpha pgp';
$remailer{'nymrod'} = '&lt;nymrod@nym.alias.net&gt; alpha pgp';
$remailer{'cubed'} = '&lt;alias@alias.alias.net&gt; alpha pgp';
$remailer{"lead"} = "&lt;mix@zifi.genetics.utah.edu&gt; cpunk pgp hash latent cut ek";
$remailer{"treehole"} = "&lt;remailer@mockingbird.alias.net&gt; cpunk pgp hash latent cut ek";
$remailer{"nemesis"} = "&lt;remailer@meaning.com&gt; cpunk pgp hash latent cut";
$remailer{"exon"} = "&lt;remailer@remailer.nl.com&gt; cpunk pgp hash latent cut ek";
$remailer{"vegas"} = "&lt;remailer@vegas.gateway.com&gt; cpunk pgp hash latent cut";
$remailer{"haystack"} = "&lt;haystack@holy.cow.net&gt; cpunk pgp hash latent cut ek";
$remailer{"ncognito"} = "&lt;ncognito@gate.net&gt; mix cpunk latent";
catalyst@netcom.com is _not_ a remailer.
lmccarth@ducie.cs.umass.edu is _not_ a remailer.
usura@replay.com is _not_ a remailer.

Groups of remailers sharing a machine or operator:
(c2 robo alpha)
(gondolin gondonym)
(flame hacktic replay)
(alumni portal)
(vishnu spook wmono nymrod)

Use "premail -getkeys pgpkeys@kiwi.cs.berkeley.edu" to get PGP keys
for the remailers. Fingering this address works too.

Note: The remailer list now includes information for the alpha
nymserver.

Last update: Sat 13 Apr 96 21:15:09 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
extropia remail@miron.vip.best.com        ----.------+  6:02:12  99.99%
exon     remailer@remailer.nl.com         ++***+*+++**     6:23  99.98%
shinobi  remailer@shinobi.alias.net       #+-.--*-+*#*  1:24:40  99.97%
mix      mixmaster@remail.obscura.com     +-++++-----+  2:46:52  99.97%
amnesia  amnesia@chardos.connix.com       --++-----+-+  2:51:06  99.97%
portal   hfinney@shell.portal.com         *####+*#####     2:28  99.95%
vishnu   mixmaster@vishnu.alias.net       +--.-*.-*++*  3:26:13  99.94%
treehole remailer@mockingbird.alias.net   --..-+.---++  5:13:16  99.89%
vegas    remailer@vegas.gateway.com        -***-..+*##  3:18:54  99.82%
ncognito ncognito@gate.net                ***#*##+ *##     1:17  99.73%
flame    remailer@flame.alias.net          ----------*  4:08:02  99.70%
alumni   hal@alumni.caltech.edu           ## ##+#* ###     8:42  99.66%
alpha    alias@alpha.c2.org                ++++++++ **    42:27  99.64%
hacktic  remailer@utopia.hacktic.nl        **** +**+**    10:24  99.54%
replay   remailer@replay.com               -***  **+*#     9:56  99.17%
c2       remail@c2.org                    +++++++++++*    46:17  99.12%
penet    anon@anon.penet.fi               --.--.__-    33:05:45  99.11%
nymrod   nymrod@nym.alias.net             +--. *-+**+*  2:27:07  98.59%
haystack haystack@holy.cow.net            *-##  ++#*##    15:32  94.05%
spook    remailer@spook.alias.net         *+*****+++ *    25:09  93.22%
cubed    alias@alias.alias.net            ********** *    19:08  92.99%
ecafe    cpunk@remail.ecafe.org           *#+####**+       1:11  92.21%
lead     mix@zifi.genetics.utah.edu         ++++++++++    40:59  91.01%
nemesis  remailer@meaning.com                           2:39:59   6.12%
</PRE>

<B>History key</B>

<UL>
<LI><TT>#</TT> response in less than 5 minutes.
<LI><TT>*</TT> response in less than 1 hour.
<LI><TT>+</TT> response in less than 4 hours.
<LI><TT>-</TT> response in less than 24 hours.
<LI><TT>.</TT> response in less than 2 days.
<LI><TT>_</TT> response in more than 2 days.
</UL>

<DL> <B>Options and features</B>

<DT> <TT>cpunk</TT>
 <DD> A major class of remailers. Supports
<TT>Request-Remailing-To:</TT> field.

<DT> <TT>eric</TT>
 <DD> A variant of the cpunk style. Uses <TT>Anon-Send-To:</TT>
instead.

<DT> <TT>penet</TT>
 <DD> The third class of remailers (at least for right now). Uses
<TT>X-Anon-To:</TT> in the header.

<DT> <TT>pgp</TT>
 <DD> Remailer supports encryption with PGP. A period after the
keyword means that the short name, rather than the full email address,
should be used as the encryption key ID.

<DT> <TT>hash</TT>
 <DD> Supports <TT>##</TT> pasting, so anything can be put into the
headers of outgoing messages.

<DT> <TT>ksub</TT>
 <DD> Remailer always kills subject header, even in non-pgp mode.

<DT> <TT>nsub</TT>
 <DD> Remailer always preserves subject header, even in pgp mode.

<DT> <TT>latent</TT>
 <DD> Supports Matt Ghio's <TT>Latent-Time:</TT> option.

<DT> <TT>cut</TT>
 <DD> Supports Matt Ghio's <TT>Cutmarks:</TT> option.

<DT> <TT>post</TT>
 <DD> Post to Usenet using <TT>Post-To:</TT> or <TT>Anon-Post-To:</TT>
header.

<DT> <TT>ek</TT>
 <DD> Encrypt responses in reply blocks using <TT>Encrypt-Key:</TT>
header.

<DT> <TT>special</TT>
 <DD> Accepts only pgp encrypted messages.

<DT> <TT>mix</TT>
 <DD> Can accept messages in <A
HREF="http://obscura.com/~loki/remailer-essay.html">Mixmaster</A>
format.

<DT> <TT>reord</TT>
 <DD> Attempts to foil traffic analysis by reordering messages.
<I>Note: I'm relying on the word of the remailer operator here, and
haven't verified the</I> <TT>reord</TT> <I>info myself.</I>

<DT> <TT>mon</TT>
 <DD> Remailer has been known to monitor contents of private email.

<DT> <TT>filter</TT>
 <DD> Remailer has been known to filter messages based on content. If
not listed in conjunction with <TT>mon</TT>, then only messages
destined for public forums are subject to filtering.

<DT> <TT>alpha</TT>
 <DD> Supports the alpha.c2.org format of nym service.

</DL>

<H3>Society and remailers</H3>

<UL>

<LI><B>New:</B> The <A
HREF="http://www.strassmann.com/pubs/anon-remail.html">spooks review
the remailer net</A>. The link is to a paper entitled "Risk-Free Access Into
The Global Information Infrastructure Via Anonymous Re-Mailers," which
is by Paul A. Strassmann and William Marlow, both of SAIC, a company
with ties to the intelligence community. They have particularly nice
things to say about this remailer list: "There is an agile and very
active global community that keeps track of the average latency time,
uptime of frequently used re-mailers. They post their findings, which
in many cases is superior to what a commercial customer is likely to
find out about their own data center performance, or about the service
quality offered by Compuserve, America-On-Line of Prodigy." Thanks,
guys!

<LI>Andr&eacute; Bacard's <A
HREF="http://www.well.com/user/abacard/remail.html">anonymous
remailer FAQ</A> is an excellent nontechnical introduction.

<LI>Remailers are starting to show up in the popular press, including
these two <A HREF="anwired-jump.html">articles in Wired</A>, and
anti-anonymity editorials in the <A
HREF="http://www.clas.ufl.edu/~avi/NII/wsj_no-anon.html">Wall Street
Journal</A> (a <A
HREF="http://www.clas.ufl.edu:80/~avi/NII/wsj_avi-response.txt">rebuttal</A>
was written by Avi Baumstein) and <A
HREF="http://www.clas.ufl.edu:80/~avi/NII/siegel_editorial.txt">San
Francisco Chronicle</A> (by Martha Siegel herself, no less!). I wrote
a <A
HREF="http://www.clas.ufl.edu:80/~avi/NII/siegel_raph-response.txt">response</A>
to the latter, but it didn't get printed. Peter Lewis wrote a front
page article for the <A
HREF="http://www.clas.ufl.edu:80/~avi/NII/NYT_anon-amok.txt">New York
Times</A> that had most of its facts wrong. A better attempt was made
by Reid Kanaley in the <A
HREF="http://www.clas.ufl.edu:80/~avi/NII/ANON_twisted.txt">Philadelphia
Inquirer</A>. Thanks to Avi Baumstein for putting these documents and
others related to <A
HREF="http://www.clas.ufl.edu:80/~avi/NII/anonymity.html">anonymity</A>
on the Web.

<LI>Another recent news item is the compromise of anon.penet.fi as a
result of a Scientology complaint. Only one name was obtained
(originally they wanted the entire database), but the legal situation
remains unclear. Here's a post describing <A
HREF="http://www.tezcat.com/~wednsday/penet.michigass">what
happened</A> and <A
HREF="http://www.tezcat.com/~wednsday/penet.pr">press release from
Johan Helsingius</A>. There was a story in <A
HREF="http://pathfinder.com:80/@@sAO1E1ClSAIAQHuq/time/magazine/domestic/1995/950306/950306.technology.html">Time
Magazine</A> by Joshua Quittner. Daniel Akst of the LA Times wrote a
<A
HREF="http://www.clas.ufl.edu:80/~avi/NII/PENET_broke.txt">column</A>
about the incident, as well.

<LI>For a somewhat, ah, er, <I>different</I> take on Net anonymity,
hop over to <A HREF="http://www.csn.net:80/~ldetweil">L.Detweiler's
home page</A>. By the way, he tells me that I am an "outsider"
relative to the cypherpunks. This may come as a surprise to the many
who have been following my involvement with the remailer network and
PGP. However, Mr. Detweiler knows (better than I) that I don't really
subscribe to the hidden "black" cypherpunk agenda.

</UL>

<H3>Tools</H3>

<UL>

<LI>Version 0.43 of <A
HREF="http://www.c2.org/~raph/premail.html">premail</A> is now out! It
requires a Unix system and Perl 5. After setup, it manages all of the
details of using the anonymous remailers, including Mixmaster
remailers. It also automatically encrypts and signs outgoing email,
and decodes incoming email with a single command. Perhaps most useful
is its ability to create and manage alpha.c2.org style nyms with good
security (each remailer in the chain re-encrypts the message) and easy
commands.

<LI>Version 3.3 of <A
HREF="http://cag-www.lcs.mit.edu/mailcrypt/">mailcrypt</A> is out, and
it directly supports remailers and PGP encryption. It's pretty much an
Emacs implementation of premail. Anyone who uses Emacs for their news
and mail should definitely check this one out. It can automatically
load the information from this remailer list.

<LI><A HREF="http://www.eskimo.com/~joelm/pi.html">Private Idaho</A>
is an anonymous remailer utility for Windows, supporting PGP, the
cypherpunks remailers, and Mixmaster, and the alpha.c2.org alias
server. It too automatically configures itself based on this remailer
list.

<LI>Wil Ussery has written a collection of <A
HREF="http://www.slip.net/~wussery/pgp.html">Anonymous FAQs</A>,
including setting up anonymous accounts, posting anonymously to
Usenet, and sending anonymous mail with Private Idaho. These FAQs will
be primarily useful for Windows users.

<LI><A
HREF="http://www.oberlin.edu/~brchkind/home/chainmail.html">ChainMail</A>
is a remailer chaining utility for Mac users, by Jonathan Rochkind. To
use it, you need Eudora, MacPGP, and applescript, in addition to a
number of applescript scripting additions.

<LI><A
HREF="http://www.c2.org/~mark/privtool/privtool.html">Privtool</A> is
a PGP-aware mailer that also supports Mixmaster.

<LI>While it is possible to post to Usenet directly through the
remailers, many feel that it is better to use a <A
HREF="http://students.cs.byu.edu/~don/mail2news.html">mail to news
gateway</A>. For those of you using premail 0.42, it is indeed your
only option. Thanks to Don Kitchen for maintaining this information.

</UL>

<H3>Web to remailer gateways</H3>

<UL>

<LI><B>New:</B> The Community ConneXion has put the Web-premail
gateway on its <A HREF="https://www.c2.org:80/remail/by-www.html">SSL
server</A>. That means that you can send anonymous email from the Web
without exposing your message in the clear on the connection between
your Web browser and the gateway. Good stuff.

<LI>Sameer Parekh's <A HREF="http://www.c2.org/">NEXUS Berkeley /
Community ConneXion</A> has a web page set up for <A
HREF="http://www.c2.org:80/remail/by-www.html">sending anonymous
mail</A> from your Web client.

<LI>Michael Hobbs has set up <A
HREF="http://miso.wwa.com/~dochobbs/premail.html">Web gateway to
premail.</A> Now you can send anonymous email directly from your Web
browser. Don't use this for extremely sensitive stuff, though, because
it isn't quite as secure as running premail yourself (in particular,
the connection between your Web browser and the gateway is not
encrypted).

<LI><A HREF="http://www.lookup.com/Homepages/64499/anon.html">Noah's
Place</A> has another Web to remailer gateway set up.

</UL>

<H3>Remailer help</H3>

<UL>

<LI>A good source for remailer information is the <A
HREF="http://www.stack.urc.tue.nl/~galactus/remailers/index.html">Anonymity,
remailers, and your privacy</A> page compiled by "Galactus". This is
also the best place to look for information about anon.penet.fi.

<LI>Matt Ghio's <A HREF="ghio-remailer-help.html">remailer list</A> is
available by fingering
<VAR>remailer.help.all@chaos.taylored.com</VAR>. This file also has
all the public keys for PGP-friendly remailers. Matt also has a
pinging service similar to this one, available by fingering
<VAR>remailer-list@chaos.taylored.com</VAR>. <B>Update:</B> Chaos is
having problems getting recognized on the Net. Try
<VAR>remailer.help.all@204.95.228.28</VAR> and see if that works any
better. Last I checked, the information here was more than a month out
of date. Newer information can be gotten by sending mail to
<VAR>mg5n+remailers@andrew.cmu.edu</VAR>.

<LI><A HREF="http://www.replay.com/remailer/replay.html">Replay remailer help</A>.

<LI><A HREF="penet.html">Penet remailer help</A>.

<LI><A HREF="mg5n.html">Help for Matt Ghio's alias system for creating
anonymous addresses.</A> I'm not sure if this service is still
supported.

<LI><A
HREF="http://www.stack.urc.tue.nl/~galactus/remailers/alpha.html">Help
for the Alpha alias server</A> (also available in a <A
HREF="alpha-help.html">plain email</A> version). In my opinion, this
is the best way to create an alias for anonymous replies to mail. Not
only is it the most cryptographically secure, but you get to pick the
alias nickname of your choice. The email addresses are of the form
alias@alpha.c2.org. Highly recommended.

</UL>

<H3>Remailers have home pages too!</H3>

<UL>

<LI><A HREF="http://www.replay.com/people/usura/">Usura's home
page</A> has a bunch of remailer related stuff on it, including a help
page on chaining remailers.

<LI>The <A HREF="http://www.armadillo.com/remailer">Armadillo
remailer</A> now has its own Web page.

<LI><A HREF="http://www.ecafe.org/~remail/">Ecafe</A> remailer has its
own Web page, including quick info about how to use the remailer
without encryption or any other extras.

<LI><A
HREF="http://www.ee.siue.edu/~avankla/mix.help.html">Shinobi</A>
remailer has its own Web page.

<LI><A HREF="http://tjava.com/">Tjava</A> remailer has a couple of Web
pages from the main Tjava web page linked here, including a nice,
easy-to-use Web gateway.

<LI><A HREF="http://idiom.com/~wcs/pamphlet.html">Pamphlet</A>
remailer's Web page includes full sources and some other helpful
information.

</UL>

<H3>Other resources</H3>

<UL>

<LI>You want to send secure mail to someone, but don't know their
key. Where are you going to get it? Try the <A
HREF="http://www-swiss.ai.mit.edu/~bal/pks-toplev.html">keyserver</A>
at MIT.

<LI><A
HREF="ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html">The
cypherpunks ftp site</A> has some <A
HREF="ftp://ftp.csua.berkeley.edu/pub/cypherpunks/remailer/.html">remailer</A>
related stuff in it.

<LI><A
HREF="ftp://furmint.nectar.cs.cmu.edu/security/README.html">Vince
Cate's Cryptorebel and Cypherpunk page</A> has pointers to lots of
cypherpunk resources.

<LI><A HREF="http://www.shellback.com/v/pt/index.htm">Dave Merriman's
CypherSite</A> is a new site that looks promising.

<LI><A HREF="http://www.jpunix.com/">John Perry's jpunix page</A> has
info on his MX service for hidden remailers, as well as cool links for
Mixmaster and other stuff.

<LI><A HREF="http://obscura.com/~loki/Welcome.html">Lance
Cottrell's home page</A>, which has his Chain script, the Mixmaster
remailer client (including Sun binaries!) as well as other cypherpunk
related topics.

<LI><A
HREF="http://electron.rutgers.edu/~gambino/anon_servers/anon.html">Vince
Gambino's remailer page</A> has a good collection of remailer help
files.

<LI>Now you can get <A
HREF="http://web.mit.edu/network/pgp-form.html">MIT PGP 2.6.2</A>
directly off the Web.

</UL>

Suggestions and more links are highly welcomed. <P>

<HR ALIGN=left WIDTH=19%> <A HREF="homepage.html">Raph Levien home</A>
</body></html>
