OmniMix - Pathway to Privacy
The Internet has become the most important medium for research and exchange of views on nearly all imaginable topics.
By breaking former information monopolies its common availability empowers people in a way never experienced before. But
its simplicity of use also seduces to an uncritical spontaneous interaction, deflecting from the fact, that every step
taken on the Internet leaves traces, which are resolutely tracked and analyzed by those interested in uncovering personal
data, is it for gathering preferences and email adresses for marketing purposes, for scanning the personal background in
the course of an application, or even for more obscure private, political or business reasons.
Relating the ease of collecting unprotected digital communication with the immense data storage capability of governmental authorities and corporate vendors of Internet services like access providers, search engines or mail hosts, it becomes obvious, that data analysis is easy to achieve and doesn't at all have to take place instantaneously, but may even happen years in the future, when unforeseen reasons to do so become evident - to the examiner and you.
The solution to that threat of pervasive observation can't be to accept it in meek compliance or to retreat completely from the Internet, but to deal with it in a prudent way and use adequate tools to counter invasion of privacy aiming at a free civil society without surveillance and harassment.
That's what's also expressed in a U.N. Report on Encryption and Internet Anonymity:
Encryption and anonymity, and the security concepts behind them, provide the privacy and security necessary
for the exercise of the right to freedom of opinion and expression in the digital age. Such security may be
essential for the exercise of other rights, including economic rights, privacy, due process, freedom of
peaceful assembly and association, and the right to life and bodily integrity.
States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online.
To make this process somewhat clearer, here's a short example with a real world analogon:
Imagine you've got some transport cases, which are graduated in size and fit into each other like those well-known little wooden Russian dolls called 'Matryoshkas'. But that's not all what makes those cases special, as they originate from various post offices, already have enough stamps on them to pay the bill, and a recipient sticker with the address of the post office they belong to already filled in. Furthermore they are equipped with a catch, which, once closed, can only be reopened with a key no one else than the single issuing post office owns.
Now, if you intend to make Marilyn, who - as everybody knows - prefers diamonds, anonymously happy, put the concerning jewellery box with her address on it into the smallest case. Then stick that case into a bigger one from a different post office and so on. Finally bring the resulting package to a post office of your choice. That's all you have to do!
Delivering the present, each post office removes its own case and forwards the one uncovered by that to the address written on it. The employees won't be able to find out more than the mail service they got the parcel from, and the one that is next in the delivery chain. On the other hand someone waiting outside trying to trace the parcel must fail, as she won't be able to assign out- to ingoing cases correctly. They look different and beyond that are randomly mixed with boxes from other customers before being forwarded. Therefore, once the parcel passes the entry post office, you yourself are out of the game.
But bear in mind: If you wrapped it up carelessly, the last postman might discover how precious your parcel is. So, whenever possible, take additional precautions against that risk, at best by trying to get a lockable case belonging to the girl you admire.
Now, if you're searching for
|·||a cost-free e-mail service without the necessity of registration|
|·||ensuring completely hidden, untraceable communication resisting even potent institutional adversaries|
|·||based on software that provides maximum source code and build process transparency|
|·||Send and receive messages from external servers through secured connections (with SSL / TLS / Tor).|
|·||Use the most advanced SASL authentication mechanism offered by the server to securely transfer your login credentials.|
|·||Add recipient related hashcash tokens to your messages to increase their chance to pass spam filters.|
|·||Protect your mail with automatic Whole Message Encryption (WME) including the header section and all attachments, and by doing so reduce the amount of information you reveal and your efforts for PGP en- resp. decryption to a minimum.|
|·||Outgoing mail (SMTP = Simple Mail Transfer Protocol)|
|·||Incoming mail (POP3 = Post Office Protocol - Version 3)|
|·||News messages (NNTP = Network News Transfer Protocol)|
Latest versions of OmniMix
(installer with all necessary binaries
or IDE to build system from sources)
version history · online manual · help file
OmniMix IDE 2.5.1
OmniMix 2.5.0 (sig) · OmniMix IDE 2.5.0 (sig)
OmniMix 2.4.9 (sig) · OmniMix IDE 2.4.9 (sig)
OmniMix 2.4.0 (sig) · OmniMix IDE 2.4.0 (sig)
OmniMix 2.3.9 (sig) · OmniMix IDE 2.3.9 (sig)
OmniMix 2.2.0 (sig) · OmniMix IDE 2.2.0 (sig)
|·||Tutorial about setting up QuickSilver, MesNews and Gravity with Stunnel, GnuPG and OmniMix, kindly contributed by an anonymous author.
You're welcome to contact me directly by mail, preferably
PGP encrypted. If your questions resp. suggestions are of common interest,
you may use the alternative of posting to the corresponding newsgroup
There you will also find competent advice on other topics of anonymous Internet communication.
As privacy is an important topic, as well as preserving it on the Internet, there are a
lot of websites dealing with it. So regard this list only as an entry point.
|Anon Topics in General|
|·||Electronic Frontier Foundation||https://www.eff.org|
|·||Privacy Link List at Cotse.net||https://www.cotse.net/resources.html|
|·||Die Raven Homepage (Deutsch)||https://hp.kairaven.de|
|·||The GNU Privacy Guard - GnuPG||http://www.gnupg.org|
|·||OpenSSL - Cryptography Library||https://www.openssl.org|
|·||VeraCrypt - Drive Encryption Software||https://www.veracrypt.fr/en/|
|Anon Internet Communication|
|·||Remailer WiKi at Panta Rhei (Wayback Machine)||http://www.panta-rhei.eu.org/pantawiki|
|·||Remailer Introduction at Dizum.com||https://dizum.com/remailer.html|
|·||Mail2News Introduction at Dizum.com||https://dizum.com/mail2news.html|
|·||Anonyme eMail über Remailer (Deutsch)||http://www.anon.gildemax.de|
|·||Richard Christman's Quicksilver (Windows Client)||http://www.quicksilvermail.net|
|·||Mixmaster Project at SourceForge.net||http://sourceforge.net/projects/mixmaster|
|·||Comprehensive Anonymity Network Information at NoReply||http://www.noreply.org|
|·||Remailer Configuration and Access Data at Allpingers.net||https://allpingers.net/|
|·||Cypherpunk / Mixmaster Remailer Statistics at Frell||http://echolot.theremailer.net|
|·||List of 'From' Header Modifications at Frell||http://echolot.theremailer.net/from.html|
|·||General Privacy Topics||news://alt.privacy|
|·||PGP Encryption and Related||news://alt.privacy.pgp|
|·||Anonymous Internet Communication||news://alt.privacy.anon-server|
|·||Anonymous Internet Communication - Server Availability||news://alt.privacy.anon-server.stats|
|·||Gerald E. Boyd's 'Accessing the Internet by E-mail' FAQ||http://www.faqs.org/faqs/internet-services/access-via-email|
|·||DNS Tools - DNSWatch||http://www.dnswatch.info|
|·||IP Lookup - Your own IP Address||http://iplookup.flashfxp.com|
|·||DDNS - List of Free Dynamic DNS Providers||http://dnslookup.me/dynamic-dns|
Copyright © Christian Danner, 2020.