Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

Why should I use a different computer to send anonymous email?


About sending anonymous email. You say “step one use someone else’s
computer…or public library computers.” Question: why use someone else’s
computer? Why not to take a laptop to an internet cafe, create fake account
there, send an email, and then later check responses not from home? Do PCs,
laptops have a unique ID?

Computers don’t really have a unique ID that would make it into your
outgoing email.


Email headers sometimes contain a lot of information that, when examined, or
used with other information, can often result in some surprising

Like “Oh, it must’ve been Leo that sent that email!”


First, I need to clarify something.

There’s proof and then there’s proof.

Much of the information that I’m thinking of can relatively easily be spoofed or faked by someone with sufficient technical knowledge. The net result is that someone who knows what they’re doing can do a pretty good job of hiding where email comes from.

“I believe that you’re more at risk from an accumulation of information that, when analyzed, points back to you.”

Heck, spammers do it every day.

So while some data might lead to some interesting conclusions, it’s not by any means proof of a technical sort.

But sometimes it doesn’t need to be absolute proof to cause a problem.

The piece of information that I’m most concerned about in this scenario is your machine name – a name you choose when you first installed or configured Windows. You can see yours by looking at the properties of “My Computer”:

Windows 7 Computer Properties highlighting computer name

That’s the name I assigned to my laptop computer.

Some, but not all, email programs will include that information in the headers of outgoing email. Some, but not all, network configurations will add that information to the routing information in the headers of outgoing email.

Here’s an example of the network case, modified somewhat to obscure some irrelevant details:

Received: from NOTENXPS ( by
 ( with Microsoft SMTP Server id 8.1.311.2; Thu, 25 Mar 2010
 16:33:27 -0400

You can see that the actual name of the machine sending the email is right there for the recipient to see, if they know where to look.

Even taking your machine to another location may not change this information, and indeed may cause it to appear due to a different network configuration.

As I said, your machine name may not be included – it’s not something you can count on – but it’s also not something you can count on not being there either.

Now that’s the most obvious, and of course you could change your machine name at will.


It’s just one piece of a larger puzzle. Perhaps an obvious piece, but just a piece.

I believe that you’re more at risk from an accumulation of information that, when analyzed, points back to you. Even without a machine name, things like consistent (albeit untraceable) IP addresses, email programs, browser information, all the way down to writing styles and wording can – when gathered together – potentially paint a picture where you’re the only likely result.

So depending on how paranoid you are about such matters and perhaps factoring in the “cost of discovery”, should it happen, you may want to consider changing as much as possible.

Changing your machine is one of the easiest.

Do this

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

I'll see you there!

6 comments on “Why should I use a different computer to send anonymous email?”

  1. Shall I ask the obvious then…?
    Why on earth would you want to send an email to someone, going out of your way to make sure the person on the other end can’t find out who the email comes from?
    I wonder…

    Aside from illegitimate uses like harassment, the most common scenario for a completely legitimate need to send anonymous email are things like whistle-blowers – folks we need to be able to report information without fear of it adversely affecting their jobs, or worse.


  2. A very interesting book to learn some good tricks is Little Brother by Cory Doctorow. The book is fiction but most of the technology is real. It’s so real, that some of the technology which wasn’t real at the time of writing is being worked on now, eg paranoid linux, which is now being put together to work like in the book. It’s a fun read and you can learn a lot.

  3. I don’t much care about “anonymous email” but did find the tech spechs in your print screen impressive! ;)

    Smile And that’s just my laptop. My desktop is a quad-core.



Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.