On Sat, Dec 26, 1998 at 05:45:26PM -0500, Austin Hill wrote:
> Zero-Knowledge has put up a draft of a whitepaper explaining the technical
> details of it's coming Freedom Internet Privacy system.
> 
> The paper discusses the technical details of our AnonymousIP protocol and
> our Pseudonymous E-mail System.
> 
> This is an early draft and comments/questions are appreciated.

Q: What is the first question you ask about any security protocol?
A: What is the threat model?

I can think of a couple of possible attacks against the AnonymousIP
protocol, but I can't tell if the protocol is supposed to withstand them. 
Are active attacks allowed? Are attacks by someone who controls an
anonymous router allowed? Where is the threat model specified? 

Reply via email to