On Sat, Dec 26, 1998 at 05:45:26PM -0500, Austin Hill wrote: > Zero-Knowledge has put up a draft of a whitepaper explaining the technical > details of it's coming Freedom Internet Privacy system. > > The paper discusses the technical details of our AnonymousIP protocol and > our Pseudonymous E-mail System. > > This is an early draft and comments/questions are appreciated. Q: What is the first question you ask about any security protocol? A: What is the threat model? I can think of a couple of possible attacks against the AnonymousIP protocol, but I can't tell if the protocol is supposed to withstand them. Are active attacks allowed? Are attacks by someone who controls an anonymous router allowed? Where is the threat model specified?
