Re: How anonymity software landscape will look

2006-09-20 Thread glymr
you can replace i2p for services with tor hidden services quite easily, and as far as content retrieval, which part of the process is your focus when ascribing insecurity? storage or transit? TOR sorts out transit, and the server operator using a decently strongly encrypted storage would keep the

Re: How anonymity software landscape will look

2006-09-20 Thread glymr
unless i'm mistaken, for the average adsl/cable user, this means some meaningless number like 10.0.0.2 or 192.168.0.4 Andrew Del Vecchio wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Very true. Add to this the use of secure apps. This means no Skype, which codes your local IP into

How anonymity software landscape will look

2006-09-19 Thread Watson Ladd
For content retrieval: Freenet/Gnunet. For anonymous services: I2P(possibly) For anonymous Internet: Tor For anonymous email: Onion Routers Each piece of software fills a niche in this hierarchy. Tor is the most important as it lets people use existing applications anonymously. Sure, Tor will

Re: How anonymity software landscape will look

2006-09-19 Thread Andrew Del Vecchio
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Very true. Add to this the use of secure apps. This means no Skype, which codes your local IP into headers, etc. ~Andrew Frivolous lawsuits. Unlawful government seizures. It's a scary world out there! Protect your privacy, keep what you earn, and