Moral Crypto
Jim Choate
ravage at einstein.ssz.com
Sat Sep 1 18:54:50 PDT 2001
On Sun, 2 Sep 2001, Nomen Nescio wrote:
> Again, the entry from non-anonymous into anonymous networks is visible.
Which is where distributed systems like Plan 9 come into play. By being
completely distributed and (at least in theory) encrypted at the network
layer the 'vulnerability' becomes connecting to the network. Of sourse
this still leaves the question of keys and their management as a 'entry'
vulnerability.
--
____________________________________________________________________
natsugusa ya...tsuwamonodomo ga...yume no ato
summer grass...those mighty warriors'...dream-tracks
Matsuo Basho
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ ravage at ssz.com
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
More information about the cypherpunks-legacy
mailing list