how bad is IPETEE?
zooko
zooko at zooko.com
Wed Jul 16 12:42:23 EDT 2008
On Jul 15, 2008, at 16:33 PM, Leichter, Jerry wrote:
> The goal is
> to use some form of opportunistic encryption to make as much
> Internet traffic as possible encrypted as quickly as possible -
> which puts all kinds of constraints on a solution,
Oh, then they should learn about Adam Langley's Obfuscated TCP:
http://code.google.com/p/obstcp/
One of the design constraints for Obfuscated TCP was that an
Obfuscated TCP connection is required to take zero more round trips
to set up and use than a normal TCP connection. Way to go, Adam!
Regards,
Zooko
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list