On Mon, Apr 23, 2001 at 11:29:41PM -0000, David Childers wrote:
> 
> >Yes, but weakening the system for people who don't care at the expense of 
> >those that do is never an option.
> 
> The means of security is * not * knowing where the data is stored, in 
> addition to the requester of the information being masked.
> 
> If you analyze traffic flow through enough nodes at various points,
> you have a reasonably good map of the network. ( Port scanners and
> sniffers are a dime a dozen for any operating system. )
Maybe. With 0.4, we can do "silent bob" steganography, which makes portscanning

Reply via email to