How about an example of such an application that needs to conceal the IP addresses of the participants from a passive observer.

Matthew Kaufman wrote:
DePriest, Greg (NBC Universal) wrote:
"That's unacceptable for certain applications."

I'm confused:  Can you provide a few examples of such applications?

Any application where the user base wishes to do its best to conceal from any one passive observer the majority of the participants in the application.

I build peer-to-peer things that let people build applications, I don't build the applications myself. This is one of the requirements that comes up from some people who (want to) build applications using the technology.

I am following the ALTO efforts because I can make the applications these developers build behave better on the network if I can have the part I build use locality information when constructing overlay networks.

Matthew Kaufman
_______________________________________________
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto

--
Richard Bennett

_______________________________________________
alto mailing list
alto@ietf.org
https://www.ietf.org/mailman/listinfo/alto

Reply via email to