TOR is in fact quite a good one, but it is only incidentally an encryption scheme.
It is a superb mechanism for preserving the anonymity of the origin of an internet communication and/or, at the expense of a little complication, obscuring its actual [intermediate] destination as opposed to its notional/nominal final one. Without wishing to be repetitive---I have made what is essentially this same point here before---it is not necessary to break, say, an email encryption scheme if the content of an email can be filched before it has been encrypted at its source or after it has been decrypted at its sink; and the NSA or another such agency might well wish to identify TOR users to this end. John Gilmore, Ashland, MA 01721 - USA ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN