From: “Wei Dai” <weidai@eskimo.com>
To: eric@remailer.net (Eric Hughes)
Message Hash: fd285128a18953663d361df01a86bc73de84f29e35ce2917f6aafbbb5275de5c
Message ID: <199502082243.AA19005@mail.eskimo.com>
Reply To: N/A
UTC Datetime: 1995-02-08 22:44:03 UTC
Raw Date: Wed, 8 Feb 95 14:44:03 PST
From: "Wei Dai" <weidai@eskimo.com>
Date: Wed, 8 Feb 95 14:44:03 PST
To: eric@remailer.net (Eric Hughes)
Subject: RE: a new way to do anonymity
Message-ID: <199502082243.AA19005@mail.eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
> I'd suggest just getting something running first, to get some
> prototyping experience.
Now that I've just spent some time compiling and playing with Matt's ESM
program, it seems almost perfectly suited for prototyping Pipe-Net
since you can use it to do nested encryption. All that's needed is
to hack it so that it implements link encryption (i.e., send a
constant stream of random data in between keypresses).
This is what the user would do: (LESM for Link Encrypted Session Manager)
lesm -l
lesm -l
login to server 1
lesm -s
lesm -l (or better yet take over a free LESM session already running
between server 1 and server 2)
login to server 2
lesm -s
lesm -s
I wonder if Matt has the time and interest do this... If not then I
guess I can try, but I've never done real crypto programming before...
Wei Dai
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBLzlIdDl0sXKgdnV5AQFKuwQAqhJulKWcPV8GWUM11+2zonT+EQ8q18YV
TAymUlhjuYo0csHP/nmoMDRpf/9veISdBQE/GlRkc1k0JsWpPBD0+6e0nA7kCTMO
xqVoXdM3F/qN31CXjMT9rgAanIXFat2Ox3bjT3g07ReaN372TPnGGvNauxO69Z52
kvWajSSXiSY=
=yF/i
-----END PGP SIGNATURE-----
Return to February 1995
Return to ““Wei Dai” <weidai@eskimo.com>”