
17 Dec
2003
17 Dec
'03
11:17 p.m.
On Wed, 25 Jun 1997, Jeremey Barrett wrote:
The trick is to design a system where an eavesdropper can't correlate a connection into the anonymous network to one coming out. Such a system will
almost certainly involve some sort of "personal proxy" running on your own machine. It might maintain a constant bandwidth to the anonymous network, but
that's sub-optimal since most people like their bandwidth for other things.
The trick for users might be to move everything through the DC net. That way you take a max. hit of 50% loss of bandwidth. The problem would likely be worse for intermediate nodes. Need to think about this some more. There is a solution... --Lucky