From: Jonathan Cooper <entropy@IntNet.net>
To: Adam Shostack <adam@bwh.harvard.edu>
Message Hash: 04baefb3ccaea1c52b15e92a252d001b10ba81a85e2b364da35da7e0c764787a
Message ID: <Pine.SV4.3.91.941220172522.654A-100000@xcalibur>
Reply To: <199412202030.PAA11794@bwh.harvard.edu>
UTC Datetime: 1994-12-20 22:39:17 UTC
Raw Date: Tue, 20 Dec 94 14:39:17 PST
From: Jonathan Cooper <entropy@IntNet.net>
Date: Tue, 20 Dec 94 14:39:17 PST
To: Adam Shostack <adam@bwh.harvard.edu>
Subject: Re: c'punks top 5
In-Reply-To: <199412202030.PAA11794@bwh.harvard.edu>
Message-ID: <Pine.SV4.3.91.941220172522.654A-100000@xcalibur>
MIME-Version: 1.0
Content-Type: text/plain
> It might also be nice to encrypt the connection from client to
> proxy. Otherwise, this service only protects you from the server
> knowing who you are. If you add encryption, then it begins to offer
> anonymity agianst people watching the proxy. (Assuming there are
> multiple connections to the proxy.)
In that case, you could make a local daemon software "wedge" that
you'd connect to that would open an encrypted connection to the proxy.
Should be rather easy. Like I said before, implementation doesn't seem
incredibly hard, but I've not seen a deluge of people offering up their
boxes for this use.
-jon
( --------[ Jonathan D. Cooper ]--------[ entropy@intnet.net ]-------- )
( PGP 2.6.2 keyprint: 31 50 8F 82 B9 79 ED C4 5B 12 A0 35 E0 9B C0 01 )
( home page: http://hyperreal.com/~entropy/ ]-------[ Key-ID: 4082CCB5 )
Return to December 1994
Return to “sameer <sameer@c2.org>”