Moral Crypto

Jim Choate ravage at einstein.ssz.com
Sat Sep 1 18:54:50 PDT 2001



On Sun, 2 Sep 2001, Nomen Nescio wrote:

> Again, the entry from non-anonymous into anonymous networks is visible.

Which is where distributed systems like Plan 9 come into play. By being
completely distributed and (at least in theory) encrypted at the network
layer the 'vulnerability' becomes connecting to the network. Of sourse
this still leaves the question of keys and their management as a 'entry'
vulnerability.


 --
    ____________________________________________________________________

            natsugusa ya...tsuwamonodomo ga...yume no ato
            summer grass...those mighty warriors'...dream-tracks

                                            Matsuo Basho

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------






More information about the cypherpunks-legacy mailing list