On Sun, 2 Sep 2001, Nomen Nescio wrote:
> Again, the entry from non-anonymous into anonymous networks is visible.
Which is where distributed systems like Plan 9 come into play. By being
completely distributed and (at least in theory) encrypted at the network
layer the 'vulnerability' becomes connecting to the network. Of sourse
this still leaves the question of keys and their management as a 'entry'
vulnerability.
--
____________________________________________________________________
natsugusa ya...tsuwamonodomo ga...yume no ato
summer grass...those mighty warriors'...dream-tracks
Matsuo Basho
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ [EMAIL PROTECTED]
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------