The Decense Project

Ray Cromwell rjc at clark.net
Sun Feb 11 00:08:54 PST 1996



> 
> > The first piece of the Decense software is designed to provide "penet" like
> > double-blind anonymous transactions for the http protocol. It is written
> > as a cgi-bin script which provides a seamless mapping between anonymous
> > ids and remote web servers. Servers running Decense can be chained like
> > anonymous remailers to increase site level security.
> 
> How is it possible to have an anonymous <-> anonymous transaction. The
> only way I see this can be done is to have the http data (c2.jpg for
> example) actually pass through your cgi-bin script so that the original
> identity (location) of the image is not revealed. This may be ok for some
> text files and documents, but who would set up this program on their
> server knowing that all their bandwidth is going to be gobbled up? 

   The same people who are running the anonymous http proxies. If you've
got a T1, it's not much of a problem. And for some people, privacy is
a selling point, like Sameer's c2 system.  Also, let's say NOW
wants to put up a site with abortion information. They could pay a set of
anonymous proxy servers for the "service" of providing a anonymous mapping
service for them. And of course, all the various CyberPorn companies,
many of whom may have their business illegalized, will want to pay for 
such a service. Especially, if the proxies are offshore.

   I'm not really concerned about who will want to provide the service.
I think there are many individuals who would. I'm concerned about making
the software available. Inline images could always be turned off in the
script if need be.

-Ray













More information about the cypherpunks-legacy mailing list