TOR is in fact quite a good one,  but it is only incidentally an
encryption scheme.

It is a superb mechanism for preserving the anonymity of the origin of
an internet communication and/or, at the expense of a little
complication, obscuring its actual [intermediate] destination as
opposed to its notional/nominal final one.

Without wishing to be repetitive---I have made what is essentially
this same point here before---it is not necessary to break, say, an
email encryption scheme if the content of an email can be filched
before it has been encrypted at its source or after it has been
decrypted at its sink; and the NSA or another such agency might well
wish to identify TOR users to this end.

John Gilmore, Ashland, MA 01721 - USA

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to