An anonymity system including a cryptographic device. The cryptographic
device of the anonymity system is adapted to initially determine whether a
response to an incoming electronic message is requested. If so, an address
of the anonymity system is encrypted with a key. In one embodiment, the
key may be a public key of a system targeted to receive an outgoing
electronic message from the anonymity system inclusive of data contained
in the incoming electronic message. The encrypted address is placed into
an outgoing electronic message before re-routing to the target system to
allow the target system to re-route the response back to the anonymity
system.