At 08:18 PM 12/19/03 -0500, Tyler Durden wrote:
[on onion routing POTS]
>"trace" that call, or payment for that matter. So if bin Laden were
feelin'
>lonely one day and signed onto the network, you could give him a call,
>without him worrying about the missles falling within a few minutes.
>
>-TD
> Because it means you can complete call to the POTs with no
> company-controlled switch involved, meaning no where to serve a court
> order. Since the call could be routed through a few intermediate nodes and
I see.
So, in the real world, X uses this to make telephone threats, your POTS gets
At 06:14 PM 12/18/2003, Morlock Elloi wrote:
> What I'd like to see is a P2P telephony that also supports end-user
> gateways to the POTS. I'm not certain, but I think there are some MS
However, I don't see people letting others use their POTS lines, nor I see
them
using their own for this purp
> What I'd like to see is a P2P telephony that also supports end-user
> gateways to the POTS. I'm not certain, but I think there are some MS
I don't get what does this have to do with crypto.
Outside crypto, this didn't quite work with (almost) public fax gateways of
'90s. In theory, you could
At 03:47 PM 12/18/2003, Major Variola (ret) wrote:
At 08:16 PM 12/18/03 +, Jim Dixon wrote:
>What exactly do you mean by "peered IP telephony"?
What I'd like to see is a P2P telephony that also supports end-user
gateways to the POTS. I'm not certain, but I think there are some MS
certified
At 08:16 PM 12/18/03 +, Jim Dixon wrote:
>What exactly do you mean by "peered IP telephony"?
>
>Voice telephony requires delays measured in tens of milliseconds. A
bit
>difficult if you also want encryption, anonymity, etc.
The problem handling the delay comes with the network, not the
encry
On Thu, 18 Dec 2003, Tyler Durden wrote:
> I'm very interested in hearing about whether any P2P networks support
> encrypted transactions of any sort yet (ie, can one yet pay for some files
> via P2P)? Are there any P2P Networks being designed deliberately to support
> anything/everything, includi
ne yet pay for some files
via P2P)? Are there any P2P Networks being designed deliberately to support
anything/everything, including peered IP Telephony?
-TD
From: "James A. Donald" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: The killer app for encryption
Date: Thu,
--
Encryption is a defense against threats. For people to adopt
encryption, they need to be threatened.
All businessmen are guilty of insider trading and destruction
of evidence. In consequence all businessmen use encrypted vpn
internally within companies, but not, however, in external
c