1996-10-15 - Re: crypto wish list (was Re: A “RIGHT” to strong crypto?)

Header Data

From: Lucky Green <shamrock@netcom.com>
To: Adam Back <aba@dcs.ex.ac.uk>
Message Hash: 9f84661d677cf4c05317698bd9b390ed94d8e4c66d79e63dd886fb967570a638
Message ID: <Pine.3.89.9610141926.A14825-0100000@netcom14>
Reply To: <199610142041.VAA00167@server.test.net>
UTC Datetime: 1996-10-15 02:24:54 UTC
Raw Date: Mon, 14 Oct 1996 19:24:54 -0700 (PDT)

Raw message

From: Lucky Green <shamrock@netcom.com>
Date: Mon, 14 Oct 1996 19:24:54 -0700 (PDT)
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: crypto wish list (was Re: A "RIGHT" to strong crypto?)
In-Reply-To: <199610142041.VAA00167@server.test.net>
Message-ID: <Pine.3.89.9610141926.A14825-0100000@netcom14>
MIME-Version: 1.0
Content-Type: text/plain





On Mon, 14 Oct 1996, Adam Back wrote:
[Quoting Uni]
> > Where are anonymous and encrypted WWW clients and hosts which permit
> > chaining?
> 
> Folks working on this?

As always when this question comes up, I give this answer:
The only idea that seems to address the issue of chaining of realtime 
connections is Wei Dai's PipeNet. However, Wei doesn't have the time to 
turn it into code. Neither do I. But my offer from years ago still 
stands: I will fully finance the *second* node running PipeNet.

For newcomers, PipeNet is a "remailer" for IP. You use constant bandwidth 
pipes to conceal traffic. To be useful in any way, PipeNet requires at 
least a dedicated T1.


--Lucky





Thread