It occurs to me to wonder how C/R is supposed to establish communications between two users of C/R systems.

You send a message to X. His C/R system, not knowing you, doesn't deliver the mail to X, it sends a challenge back to you.

Your C/R system, not knowing X, sends him a C/R message, demanding he jump through hoops to send YOU a C/R message.

His system recieves the C/R message from your system. Not knowing you, it sends you a C/R message...

While this is good for bandwidth providers that charge by the bit, it isn't clear to me how you establish communications.

Perhaps the original sender calls the recipient on the phone and asks to be pre-authorized to break the loop?

       Loren


Reply via email to