Pseudo An Anonymous Email Relay Server

نویسندگان

  • Nicholas Mohr
  • Johnathon Root
  • Scott Robinson
  • Chae Won Lee
چکیده

Modern secure email protocol relies on PGP encryption to ensure privacy. However, while PGP can confirm message body authenticity and privacy, it fails to provide anonymity. This is because it leaves all identifying headers of an email such as IP and email addresses in plain text. As a result, users are often left vulnerable when communicating with compromised machines. We propose Pseudo, an SMTP relay server capable of stripping identifying information from emails as a solution to improving anonymity when sending emails. Pseudo is intended to be an extra layer of security used on top of PGP to assure not only privacy, but also anonymity. This paper discusses Pseudo’s implementation, how it can securely maintain persistent anonymity between two communicating parties, and the shortcomings our implementation faces. A working programmatic implementation can be found at https://github.com/sdrobs/Pseudo.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Secure Relay Based Routing Protocol in Wireless Sensor Network

Present network communication protocol in wireless sensor network posses wide range of security vulnerabilities in routing data packets between the hops or base station (Server). It is impossible to detect such vulnerabilities and attackers exploit these vulnerabilities in order to penetrate into the network. Many researchers and security forum focus to overcome such vulnerabilities in routing ...

متن کامل

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty The recent public disclosure of mass surveillance of electronic communication, involving powerful government authorities, has drawn the public’s attention to issues regarding Internet privacy. For almost a decade now, there have been several research efforts towards designing and deploying open so...

متن کامل

Advanced Methods for Botnet Intrusion Detection Systems

Today, our dependence on the internet has grown manifold. So has the need to protect our vast personal information accessible via web interfaces such as online passwords, corporate secrets, online banking accounts, and social networking accounts like Facebook. The appearance of botnets in the internet scene over the last decade, and their ever changing behavior has caused real challenges that c...

متن کامل

A Flyweight RFID Authentication Protocol

We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudo-random number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG. The protocol is optimistic with constant lookup time, and can be easily a...

متن کامل

Algorithmically Determining Store-and-Forward MTA Relays Using DomainKeys

Store-and-forward MTA relaying servers have frequently presented problems to various antispam techniques, such as IPbased reputation or email authentication. Algorithms that find email relaying servers can use knowledge about a domain’s outbound IP addresses combined with cryptographic domain authentication frameworks such as DomainKeys. This paper presents one such algorithm. 1.Why find relayi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015