At 11:32 AM 04/03/2003 -0800, Bill Frantz wrote:
Ah yes, I haven't updated my timings for the new machines that are faster
than my 550Mhz. :-)
The only other item is importance is that the exhaustive search time isn't
the time to reverse one IP, but the time to reverse all the IPs that have
been r
So instead of one-way-hashing just the IP, hash the IP and a temporary
throw-away secret that gets cycled at some regular interval (daily,
weekly, monthly). Yes, this means that the logged IPs are still
decypherable by anyone with access to that secret, but anyone with
access to the machine in
Bill Frantz wrote:
At 6:16 PM -0800 4/2/03, Seth David Schoen wrote:
Bill Frantz writes:
The http://cryptome.org/usage-logs.htm URL says:
Low resolution data in most cases is intended to be sufficient for
marketing analyses. It may take the form of IP addresses that have been
subjected to a o
Could this not use most of the code from the Onion Router itself. I am
assuming that the code was made freely available and someone has a copy if
it?
-- roop
On Thu, 3 Apr 2003, Ben Laurie wrote:
> Ben.
>
> [1] FWIW, I'd be willing to work on that, but n
At 6:16 PM -0800 4/2/03, Seth David Schoen wrote:
>Bill Frantz writes:
>
>> The http://cryptome.org/usage-logs.htm URL says:
>>
>> >Low resolution data in most cases is intended to be sufficient for
>> >marketing analyses. It may take the form of IP addresses that have been
>> >subjected to a one
John Young wrote:
Ben,
Would you care to comment for publication on web logging
described in these two files:
http://cryptome.org/no-logs.htm
http://cryptome.org/usage-logs.htm
Cryptome invites comments from others who know the capabilities
of servers to log or not, and other means for pr
Bill Frantz writes:
> The http://cryptome.org/usage-logs.htm URL says:
>
> >Low resolution data in most cases is intended to be sufficient for
> >marketing analyses. It may take the form of IP addresses that have been
> >subjected to a one way hash, to refer URLs that exclude information other
>
At 2:58 PM -0800 4/2/03, John Young wrote:
>Ben,
>
>Would you care to comment for publication on web logging
>described in these two files:
>
> http://cryptome.org/no-logs.htm
>
> http://cryptome.org/usage-logs.htm
>
>Cryptome invites comments from others who know the capabilities
>of servers to
Ben,
Would you care to comment for publication on web logging
described in these two files:
http://cryptome.org/no-logs.htm
http://cryptome.org/usage-logs.htm
Cryptome invites comments from others who know the capabilities
of servers to log or not, and other means for protecting user priv