1998-05-04 - Re: Why does the Navy research onion routing?

Header Data

From: Bill Stewart <stewarts@ix.netcom.com>
To: David Honig <cypherpunks@toad.com
Message Hash: c558b0685975b128825e25fc7e9b0d54d707fcb1eff7324830bf5e93aaf23f38
Message ID: <3.0.5.32.19980503230738.009147c0@popd.ix.netcom.com>
Reply To: <3.0.5.32.19980429090405.0079b940@otc.net>
UTC Datetime: 1998-05-04 06:50:43 UTC
Raw Date: Sun, 3 May 1998 23:50:43 -0700 (PDT)

Raw message

From: Bill Stewart <stewarts@ix.netcom.com>
Date: Sun, 3 May 1998 23:50:43 -0700 (PDT)
To: David Honig <cypherpunks@toad.com
Subject: Re: Why does the Navy research onion routing?
In-Reply-To: <3.0.5.32.19980429090405.0079b940@otc.net>
Message-ID: <3.0.5.32.19980503230738.009147c0@popd.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 09:04 AM 4/29/98 -0700, David Honig wrote:
>Why does the Navy research onion routing?
>
>Only reason I can think of is so that .mil can 
>study other sites anonymously, or communicate
>amongst themselves using anonymous-routing-tech
>to avoid traffic analysis.
>
>The other practical possibility is that they're happy
>to have smart CS people and will fund whatever they
>want to do, just to keep them.

There is some of the latter involved, but the military
does have times they'd like to check out web pages
without traffic analysis, just as they'd like
to be order lots of pizza without folks figuring out
that they're up to something.  This includes several cases -
using the public or civilian-government internet,
and also using their own intranets which may be less
than totally secure.
				Thanks! 
					Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





Thread