| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
In-Reply-To: <Pine.SOL.4.61.0807151829020.1009@mental> Cc: Eugen Leitl <eugen@leitl.org>, Cryptography List <cryptography@metzdowd.com> From: zooko <zooko@zooko.com> Date: Wed, 16 Jul 2008 10:42:23 -0600 To: "Leichter, Jerry" <leichter_jerrold@emc.com> On Jul 15, 2008, at 16:33 PM, Leichter, Jerry wrote: > The goal is > to use some form of opportunistic encryption to make as much > Internet traffic as possible encrypted as quickly as possible - > which puts all kinds of constraints on a solution, Oh, then they should learn about Adam Langley's Obfuscated TCP: http://code.google.com/p/obstcp/ One of the design constraints for Obfuscated TCP was that an Obfuscated TCP connection is required to take zero more round trips to set up and use than a normal TCP connection. Way to go, Adam! Regards, Zooko --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |