How about an example of such an application that needs to conceal the IP
addresses of the participants from a passive observer.
Matthew Kaufman wrote:
DePriest, Greg (NBC Universal) wrote:
"That's unacceptable for certain applications."
I'm confused: Can you provide a few examples of such applications?
Any application where the user base wishes to do its best to conceal
from any one passive observer the majority of the participants in the
application.
I build peer-to-peer things that let people build applications, I
don't build the applications myself. This is one of the requirements
that comes up from some people who (want to) build applications using
the technology.
I am following the ALTO efforts because I can make the applications
these developers build behave better on the network if I can have the
part I build use locality information when constructing overlay networks.
Matthew Kaufman
_______________________________________________
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto
--
Richard Bennett
_______________________________________________
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto