NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)

Lodewijk andré de la porte l at odewijk.nl
Sun Aug 25 17:39:21 PDT 2013


2013/8/25 Eugen Leitl <eugen at leitl.org>

> > For example, I think Tor may remain centralish rather than pure
> > dhtish for that purpose. But what if the centrality was undertaken
>
> If you want to scale to millions if not billions of nodes, what
> are your options?


You must have a really stupid P2P network if it doesn't scale. Can you even
still call it p2p if it doesn't scale?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 713 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20130826/3eb363b1/attachment-0001.txt>


More information about the cypherpunks mailing list