YAMN Remailer

Usenet  YAMN v2 anonymous remailer node. Mix network routing with modern cryptography. Web interface accessible via Tor before the mix network.


What YAMN is

YAMN (Yet Another Mix Net) is a remailer implementation written in Go, derived from Mixmaster but with substantially revised cryptography. It operates as a node in a decentralised mix network: messages are encrypted in layers, routed through a chain of independent remailer nodes, and only delivered to their destination after passing through the full chain. No single node knows both the sender and the recipient.

We run a publicly listed YAMN v2 node. It participates in the global mix network alongside other operators and is regularly pinged by Echolot, the remailer reliability tracker.


How mix network routing works

When you send a message through the mix network, the client wraps it in multiple layers of encryption — one per hop in the chain. Each node in the chain decrypts one layer, learns only the next hop, and forwards the message. The final node delivers it to the destination.

Sender
  ↓ encrypts with entry/middle/exit node keys (layered)
Entry node — decrypts outer layer, learns: next = middle
  ↓
Middle node — decrypts next layer, learns: next = exit
  ↓
Exit node — decrypts final layer, delivers to destination
  ↓
Recipient

Nodes also apply randomised delays and pool mixing before forwarding, which breaks timing correlation attacks. An observer watching the network cannot link an incoming message to an outgoing one.


Cryptography

YAMN v2 replaces the legacy Mixmaster cipher suite with modern primitives:

  • Symmetric encryption: AES (replaces Triple-DES)
  • Asymmetric encryption: NaCl Box — Curve25519 + XSalsa20-Poly1305 (replaces RSAES-PKCS1-v1_5)
  • Integrity: Blake2 (replaces MD5)
  • Header padding: deterministic, to prevent tagging attacks where an adversary marks a specific message to track it through the network

Each hop uses an independent keypair. Compromise of any single node does not expose the full path or the message content.


Tor before the mix network

Our web interface routes your submission through Tor before it enters the YAMN mix network. This adds a layer of network-level anonymity at the point of entry: the remailer node sees a Tor exit, not your IP. Combined with the mix network's multi-hop routing and timing obfuscation, the result is two independent anonymisation layers operating in sequence.

For maximum protection, access the web interface from Tor Browser.


Web interface

The web interface at yamnweb.virebent.art lets you send anonymous messages through the YAMN network without installing any client software. You configure:

  • Entry, middle, and exit nodes — choose from available nodes in the network (yamn2, frell, yamn3, paranoyamn, and others)
  • From and Reply-To addresses — can be arbitrary or omitted
  • Recipient address — email or newsgroup posting
  • Number of copies — 1 to 3, for delivery redundancy across independent paths
  • Message body

All submissions are routed via Tor hidden service before entering the mix network. No message logging, no retention.


Node stats

Our node is listed in the public remailer directory and monitored by Echolot. You can check its current reliability score and uptime at:

Echolot stats: echolot.virebent.art
Remailer address: yamn.virebent.art


No registration, no account. Open the web interface, compose your message, select your chain, and send.

Open YAMN Web Interface →    Echolot node stats →