From: Adam Shostack <adam@bwh.harvard.edu>
To: entropy@IntNet.net (Jonathan Cooper)
Message Hash: 7273a443758566fb3a36e22a8bb1aa42df2b424b5f2b9937f287ff8045292cce
Message ID: <199412202030.PAA11794@bwh.harvard.edu>
Reply To: <Pine.SV4.3.91.941220141136.28927B-100000@xcalibur>
UTC Datetime: 1994-12-20 20:31:57 UTC
Raw Date: Tue, 20 Dec 94 12:31:57 PST
From: Adam Shostack <adam@bwh.harvard.edu>
Date: Tue, 20 Dec 94 12:31:57 PST
To: entropy@IntNet.net (Jonathan Cooper)
Subject: Re: c'punks top 5
In-Reply-To: <Pine.SV4.3.91.941220141136.28927B-100000@xcalibur>
Message-ID: <199412202030.PAA11794@bwh.harvard.edu>
MIME-Version: 1.0
Content-Type: text/plain
Jonathan Cooper wrote:
| > > 1. anonymous http proxy servers ("re-webbers")
| >
| > What is wanted/meant for these ?
|
| A proxy server for HTTP transport so that one could access the web
| anonymously. I don't think coding is the problem here; one could be
| easily hacked out in perl, or you could use CERN HTTPD as a proxy
| server. I think the problem is finding someone who will offer up their
| machine as a place to run this service.
It might also be nice to encrypt the connection from client to
proxy. Otherwise, this service only protects you from the server
knowing who you are. If you add encryption, then it begins to offer
anonymity agianst people watching the proxy. (Assuming there are
multiple connections to the proxy.)
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
Return to December 1994
Return to “sameer <sameer@c2.org>”