From: John Young <jya@pipeline.com>
To: Ryan Lackey <rdl@MIT.EDU>
Message Hash: 48d023ad54abc7e1bd1e33666f5d3684ab3e04658fcc778f2889b54d28b63377
Message ID: <1.5.4.32.19980118175025.006deea8@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1998-01-18 17:51:30 UTC
Raw Date: Mon, 19 Jan 1998 01:51:30 +0800
From: John Young <jya@pipeline.com>
Date: Mon, 19 Jan 1998 01:51:30 +0800
To: Ryan Lackey <rdl@MIT.EDU>
Subject: Re: Eternity - an alternative approach
Message-ID: <1.5.4.32.19980118175025.006deea8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Ryan Lackey wrote:
>However, I've recently become aware of "IDIP", or "Intruder Detection
>and Isolation Protocol" through potentially questionable sources (my
>source is mostly NDA-wary).
Ryan,
Any chance you could get more info on this and pass it along? Or maybe
your source could spec it through a remailer if you can persuade that
the cutout is truly inviolable.
Thanks,
John
Return to January 1998
Return to “John Young <jya@pipeline.com>”
1998-01-18 (Mon, 19 Jan 1998 01:51:30 +0800) - Re: Eternity - an alternative approach - John Young <jya@pipeline.com>