1998-01-18 - Re: Eternity - an alternative approach

Header Data

From: John Young <jya@pipeline.com>
To: Ryan Lackey <rdl@MIT.EDU>
Message Hash: 48d023ad54abc7e1bd1e33666f5d3684ab3e04658fcc778f2889b54d28b63377
Message ID: <1.5.4.32.19980118175025.006deea8@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1998-01-18 17:51:30 UTC
Raw Date: Mon, 19 Jan 1998 01:51:30 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 01:51:30 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: Eternity - an alternative approach
Message-ID: <1.5.4.32.19980118175025.006deea8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Ryan Lackey wrote:

>However, I've recently become aware of "IDIP", or "Intruder Detection
>and Isolation Protocol" through potentially questionable sources (my
>source is mostly NDA-wary).

Ryan,

Any chance you could get more info on this and pass it along? Or maybe 
your source could spec it through a remailer if you can persuade that
the cutout is truly inviolable.

Thanks,

John






Thread