This server is part of the Ibis network

What is Ibis?

Ibis allows average people to post messages anonymously to Twitter. It accomplishes this using a mix network cascade; a message is encrypted in layers and passed to three nodes in turn, each of which forwards messages to the next node in large batches. The final node recovers the message and posts it to a Twitter account on behalf of the original sender. So long as the user trusts at least one node in the cascade, they can be assured that their identity cannot be linked to any messages they post to Twitter using Ibis.

Who needs Ibis?

The intent is to enable people to publicly disclose information over Twitter, when circumstances such as censorship might make this difficult, dangerous or impossible. The creators of Ibis believe that the right to such public disclosures is under increasing strain in many parts of the world, and that Ibis' minimal technical requirements make it an effective aid towards this end.

How secure is Ibis?

By design, none of the nodes in the Ibis network is able to link a message posted through the network to its original sender. Furthermore, the only information that is logged by nodes is non-identifying information regarding usage and traffic volume. As such, there is little the operator of this node can do to assist in tracing traffic, and attempts to seize this node will accomplish nothing.

Can Ibis be misused?

Ibis is not designed for malicious computer users, but it is true that they could use the network for malicious ends. However, unlike the Tor Network, which routes general internet traffic, the Ibis network transmits only text messages destined for public display on Twitter. The public nature of Ibis posts makes its uses for criminal communications extremely limited, and there have not as of yet been any issues regarding malicious activity on the Ibis network. In the mind of this operator, the social need for censorship-resistant, public information disclosure over Twitter trumps the small risk of misuse which may arise from providing such a service.

Contact this node maintainer

That being said, if you still have a complaint about this node, you may e-mail the maintainer.

(This page borrows some of its content from the This is a Tor Node template.)