1994-12-20 - Re: c’punks top 5

Header Data

From: Jonathan Cooper <entropy@IntNet.net>
To: Adam Shostack <adam@bwh.harvard.edu>
Message Hash: 04baefb3ccaea1c52b15e92a252d001b10ba81a85e2b364da35da7e0c764787a
Message ID: <Pine.SV4.3.91.941220172522.654A-100000@xcalibur>
Reply To: <199412202030.PAA11794@bwh.harvard.edu>
UTC Datetime: 1994-12-20 22:39:17 UTC
Raw Date: Tue, 20 Dec 94 14:39:17 PST

Raw message

From: Jonathan Cooper <entropy@IntNet.net>
Date: Tue, 20 Dec 94 14:39:17 PST
To: Adam Shostack <adam@bwh.harvard.edu>
Subject: Re: c'punks top 5
In-Reply-To: <199412202030.PAA11794@bwh.harvard.edu>
Message-ID: <Pine.SV4.3.91.941220172522.654A-100000@xcalibur>
MIME-Version: 1.0
Content-Type: text/plain


> 	It might also be nice to encrypt the connection from client to
> proxy.  Otherwise, this service only protects you from the server
> knowing who you are.  If you add encryption, then it begins to offer
> anonymity agianst people watching the proxy.  (Assuming there are
> multiple connections to the proxy.)

   In that case, you could make a local daemon software "wedge" that 
you'd connect to that would open an encrypted connection to the proxy.  
Should be rather easy.  Like I said before, implementation doesn't seem 
incredibly hard, but I've not seen a deluge of people offering up their 
boxes for this use.

-jon
( --------[ Jonathan D. Cooper ]--------[ entropy@intnet.net ]-------- )
( PGP 2.6.2 keyprint: 31 50 8F 82 B9 79 ED C4  5B 12 A0 35 E0 9B C0 01 )
( home page: http://hyperreal.com/~entropy/ ]-------[ Key-ID: 4082CCB5 )





Thread