Second, secure communications--strengthened through such devices as encryption, free e-mail accounts, Internet relay chat, steganography, anonymous remailers
, and web-based bulletin boards--make it difficult to link a message with an individual, thus enhancing operational security.
(111) The dilution or poisoning approach may not provide a serious impediment to phishers who may simply automate the verification of the data they collect, or devise methods to detect submissions from suspicious sources (e.g., multiple submissions from one source, or submissions sent via anonymous remailers
The statements were: "I always look for and read privacy policies on the Web"; "In addition to my work e-mail, I have a separate e-mail account for my personal e-mail"; "I talk with my children about getting my permission before giving out information online"; "I clear my computer's memory after browsing"; "I make sure that online forms are secure before filling out information"; "I set up my browser to reject unnecessary cookies"; "I use anonymous remailers
"; "I encrypt my e-mail"; "I use anonymizers while browsing"; "When given the chance, I opt-out of third party information sharing."
for Operators of True Anonymity Remailers
in Cyberspace: An Examination
technologies, such as anonymous remailers
, designed for the specific
allow individuals to send electronic mail without transmitting any information that would enable others to determine the identity of the author.
(121.) For further discussion of remailers
, see John Schwartz, With E-mail Privacy in Jeopardy, "Remailer
" Closes Up Shop, WASH.
are services that mask the origin of an e-mail address by stripping off all identifying information and replacing it with an anonymous code number.(193) All one has to do is send his e-mail message to a free anonymous remailer
, such as the one at the Massachusetts Institute of Technology's Laboratory for Computer Science, which then strips off the identifying information and resends it anonymously.(194) Anyone trying to trace the e-mail back to the sender would be unable to get beyond the anonymous remailer
as these services generally have a policy of destroying the logs of their operations.(195) There are similar services, such as Anonymizer,(196) that allow for similarly anonymous viewing of Internet web pages.(197)
Unfortunately, the best solutions we've come up with so far are such aberrant technologies as anonymizers, encryption services, remailers
, and pseudonym services.
It is difficult to identify e-mailers who have used remailers
unless they have made a mistake.
They can use anonymous remailers
to send e-mails, and they can conduct illegal transactions with untraceable digital cash.