I do think the world is coming to a end

Bryn M. Reeves bmr at redhat.com
Thu May 31 11:59:53 UTC 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/31/2012 07:04 AM, Joe Zeff wrote:
> On 05/30/2012 08:01 PM, Tim wrote:
>> On the one hand, it says calls do not pass through it (it just
>> organises the two parties to connect to each other).  And, on the
>> other hand, it talks about not exposing the calling party's IPs,
>> which is an impossible thing to do for peer-to-peer.  The only
>> way to hide the IPs is to have at least one proxy in the middle,
>> where the entire call passes through.
> 
> Before it can connect the two parties, it has to know both of their
> IP addresses even if the call is managed peer-to-peer once the
> connection is made.

Although skype probably has this requirement it's not true in the
general case. There are methods available that allow two
mutually-anonymous parties to set up a rendezvous via (also anonymous
and untrusted) third parties in such a way that no party can discover
the network identity of the others or eavesdrop on the resulting
communications.

The TOR hidden service model implements this via rendezvous and
introduction points that allow nodes to discover and connect to
published hidden services.

Regards,
Bryn.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk/HXTkACgkQ6YSQoMYUY961vACgxQwTPrAEHoPP/g5Rycj2jxm0
a1cAniAb39mT8LBQptGx1Y35R+UeO4+n
=91dr
-----END PGP SIGNATURE-----


More information about the users mailing list