Hi,

> Off the top of my head, other techniques that make the same tradeoff are:
>  - Tor Hidden Services, as you mentioned
>  - SSH & OpenPGP fingerprints (here's my fingerprint, no matter where
> you find it, that's my identifier)
>  - YURLs http://www.waterken.com/dev/YURL/httpsy/
>  - From the above URL: Freenet's CHKs, Mnet's mnetids, Chord's keys,
> Freenet's SSKs, SPKI's certificates

Add this here:
https://gnunet.org/sites/default/files/grothoff_slides_berlin.pdf

>From slide 39.

Ralph


-- 
Ralph Holz
I8 - Network Architectures and Services
Technische Universität München
http://www.net.in.tum.de/de/mitarbeiter/holz/
Phone +49.89.289.18043
PGP: A805 D19C E23E 6BBB E0C4  86DC 520E 0C83 69B0 03EF
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
[email protected].

Reply via email to