On Mar 27, 2009, at 1:57 PM, Matthew Kaufman wrote:
DePriest, Greg (NBC Universal) wrote:
"That's unacceptable for certain applications."
I'm confused: Can you provide a few examples of such applications?
Any application where the user base wishes to do its best to conceal
from any one passive observer the majority of the participants in
the application.
This seems a weak adversary to consider, so weak as to be irrelevant.
The idea that an adversary would be so passive as to be ineffective,
when there are great active attacks, seems a silly constraint.
And if privacy is a real concern, you don't want direct P2P, but an
indirect overlay.
There is a reason why Tor uses a "3-hop" rule on its communication,
but such overlays are vastly less efficient for transmitting bulk data.
_______________________________________________
alto mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/alto