On Sat, Sep 11, 2004 at 11:38:00AM -0700, Joe Touch wrote:
> >>Although anonymous access is not the primary goal, it is a feature
> >>of the solution.
> >
> >The access is _not_ anonymous. The originator's IP, ISP call traces,
> >phone access records will be all over it and associated audit logs.
Joe Touch <[EMAIL PROTECTED]> wrote:
> >The point has nothing to do with anonymity;
>
> The last one, agreed. But the primary assumption is that we can avoid a
> lot of infrastructure and impediment to deployment by treating an
> ongoing conversation as a reason to trust an endpoint, rather than