[128226] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: how bad is IPETEE?

daemon@ATHENA.MIT.EDU (zooko)
Wed Jul 16 14:50:55 2008

In-Reply-To: <Pine.SOL.4.61.0807151829020.1009@mental>
Cc: Eugen Leitl <eugen@leitl.org>,
 Cryptography List <cryptography@metzdowd.com>
From: zooko <zooko@zooko.com>
Date: Wed, 16 Jul 2008 10:42:23 -0600
To: "Leichter, Jerry" <leichter_jerrold@emc.com>

On Jul 15, 2008, at 16:33 PM, Leichter, Jerry wrote:

> The goal is
> to use some form of opportunistic encryption to make as much
> Internet traffic as possible encrypted as quickly as possible -
> which puts all kinds of constraints on a solution,

Oh, then they should learn about Adam Langley's Obfuscated TCP:

http://code.google.com/p/obstcp/

One of the design constraints for Obfuscated TCP was that an  
Obfuscated TCP connection is required to take zero more round trips  
to set up and use than a normal TCP connection.  Way to go, Adam!

Regards,

Zooko

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post