End-to-End Encryption

Timothy C. May tcmay at got.net
Fri Feb 2 10:11:54 PST 1996


At 4:57 PM 2/2/96, Anonymous wrote:

>Is there technology for eluding these espionage-enabled
>chokepoints -- tunneling, satellite-richochet or
>otherwise?

End-to-end encryption.

So long as users can do end-to-end encryption, at various levels (that is,
end users use things like PGP, other levels use things like SWIPE or
PipeNet, etc.), what surveillance organizations do to monitor channels is
not so critical.

And remailers and proxies make traffic analysis less possible.

--Tim May

Boycott espionage-enabled software!
We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^756839 - 1  | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."










More information about the cypherpunks-legacy mailing list