On Sat, Oct 25, 2014 at 12:08:07PM -0700,
 Watson Ladd <[email protected]> wrote 
 a message of 37 lines which said:

> Can we actually solve this problem? 

"Privacy" is not binary. We do not try to make impossible for the
attacker to learn things, just to make it more difficult than it is. 

> Yes: there are PIR protocols that force an attacker to compromise
> multiple independent parties to learn the results of a query.

> Many of these PIR protocols are very efficient.

Do you have more specific references?

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to