Matthew Toseland wrote:
> Having said that, is going through untrusted nodes as gateways from one 
> trusted node to another a problem? As long as we can choose two cell members 
> to go through, we should be okay?

So we onion-encrypt the request with the keys of two cell members, one
of which is the exit node, and allow the request to find its own way
from the initiator to the first cell member and from there to the
second? Sounds plausible...

Cheers,
Michael

Reply via email to