From: Jon Lasser <jlasser@rwd.goucher.edu>
To: Carl Ellison <cme@cybercash.com>
Message Hash: 5deabc97c6cb539896143462b1d2eacb33bb6c194c3f62b2fbb8f216389625c5
Message ID: <Pine.SUN.3.91.960215122741.4852B-100000@rwd.goucher.edu>
Reply To: <v02140b0bad491b46cf8f@[204.254.34.231]>
UTC Datetime: 1996-02-15 22:41:21 UTC
Raw Date: Fri, 16 Feb 1996 06:41:21 +0800
From: Jon Lasser <jlasser@rwd.goucher.edu>
Date: Fri, 16 Feb 1996 06:41:21 +0800
To: Carl Ellison <cme@cybercash.com>
Subject: Re: Some thoughts on the Chinese Net
In-Reply-To: <v02140b0bad491b46cf8f@[204.254.34.231]>
Message-ID: <Pine.SUN.3.91.960215122741.4852B-100000@rwd.goucher.edu>
MIME-Version: 1.0
Content-Type: text/plain
On Thu, 15 Feb 1996, Carl Ellison wrote:
> >The more complex portion (from my perspective, at any rate) is a
> >modification of the standard TCP/IP protocol, requiring that each packet
> >be signed by its originating user.
>
> That's the killer. Signatures take a huge amount of CPU time. Signing
> each packet is not going to be cost effective.
Yep; this has been pointed out to me already. On this point I concur.
> However, they could have an authenticated key exchange and then symmetric-
> encrypt each TCP/IP connection. That can perform -- and has the nice
> side effect [from the Chinese POV] of depriving the NSA of Chinese civilian
> net intelligence. As long as the key exchange is signed, everything
> travelling using that key is authenticated implicitly.
How would packets coming into the country be marked / passed on?
So it seems that, in general, the Chinese supression of the net is
possible. A frightening thought. Or, if you think about potential
implications 10 yrs down the road here, a sobering thought.
Jon
----------
Jon Lasser (410)494-3072 - Obscenity is a crutch for
jlasser@rwd.goucher.edu inarticulate motherfuckers.
http://www.goucher.edu/~jlasser/
Finger for PGP key (1024/EC001E4D) - Fuck the CDA.
Return to February 1996
Return to “Jon Lasser <jlasser@rwd.goucher.edu>”