From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
To: shamrock@cypherpunks.to
Message Hash: ad5147d6e0e3dc9910ad5be901d281f66fb5e7210f19ba713130a630f427dab4
Message ID: <9801191721.AA52458@public.uni-hamburg.de>
Reply To: <Pine.BSF.3.96.980119102223.9263B-100000@pakastelohi.cypherpunks.to>
UTC Datetime: 1998-01-19 18:57:34 UTC
Raw Date: Tue, 20 Jan 1998 02:57:34 +0800
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Tue, 20 Jan 1998 02:57:34 +0800
To: shamrock@cypherpunks.to
Subject: Re: Onion routing
In-Reply-To: <Pine.BSF.3.96.980119102223.9263B-100000@pakastelohi.cypherpunks.to>
Message-ID: <9801191721.AA52458@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain
> Furthermore, it must be impossible to discern indiviual messages, meaning
> connections being opened or closed. Which requires Pipenet, possibly the
> worst bandwidth burner ever invented. :-)
With Onion Routing, eavesdroppers cannot see connections being opened
and closed, but all the Onion Routers do.
How is it done in Pipenet?
Return to January 1998
Return to ““William H. Geiger III” <whgiii@invweb.net>”