Protecting E-mail Anonymity with an Anonymizer Bouncer

ABSTRACT

Communication between people has always been a part of society. In the past, people could omit the return address from a letter to keep the sender’s identity private. The problem is that it is not as easy to achieve anonymity when sending and receiving e-mails. This paper discusses ways of achieving anonymity when using e-mail as communication for instance, in lodging complaints to a grievance department. Anonymity is defined as hiding the identity and personal information of an individual. The proposed model uses an anonymous re-mailer to show how the sender of an e-mail’s identity can remain anonymous.


AUTHORS

Dariel Solution
South Africa

Mercia Malan is currently an Honours student, at the University of Pretoria, in the field of Computer Science. She is also a full-time software developer.

Defence, peace, safety and security, Council for Scientific and Industrial Research
South Africa

Francois Mouton is currently a PhD student, at the University of Pretoria, in the field of Computer Security and Social Engineering. He is also full time employed by the CSIR to perform research on Information Warfare.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com