From: Lucky Green <shamrock@netcom.com>
To: Adam Back <aba@dcs.ex.ac.uk>
Message Hash: 9f84661d677cf4c05317698bd9b390ed94d8e4c66d79e63dd886fb967570a638
Message ID: <Pine.3.89.9610141926.A14825-0100000@netcom14>
Reply To: <199610142041.VAA00167@server.test.net>
UTC Datetime: 1996-10-15 02:24:54 UTC
Raw Date: Mon, 14 Oct 1996 19:24:54 -0700 (PDT)
From: Lucky Green <shamrock@netcom.com>
Date: Mon, 14 Oct 1996 19:24:54 -0700 (PDT)
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: crypto wish list (was Re: A "RIGHT" to strong crypto?)
In-Reply-To: <199610142041.VAA00167@server.test.net>
Message-ID: <Pine.3.89.9610141926.A14825-0100000@netcom14>
MIME-Version: 1.0
Content-Type: text/plain
On Mon, 14 Oct 1996, Adam Back wrote:
[Quoting Uni]
> > Where are anonymous and encrypted WWW clients and hosts which permit
> > chaining?
>
> Folks working on this?
As always when this question comes up, I give this answer:
The only idea that seems to address the issue of chaining of realtime
connections is Wei Dai's PipeNet. However, Wei doesn't have the time to
turn it into code. Neither do I. But my offer from years ago still
stands: I will fully finance the *second* node running PipeNet.
For newcomers, PipeNet is a "remailer" for IP. You use constant bandwidth
pipes to conceal traffic. To be useful in any way, PipeNet requires at
least a dedicated T1.
--Lucky
Return to October 1996
Return to “Nelson Minar <nelson@media.mit.edu>”