POV-Ray : Newsgroups : povray.off-topic : This is cool Server Time
6 Sep 2024 23:22:13 EDT (-0400)
  This is cool (Message 11 to 12 of 12)  
<<< Previous 10 Messages Goto Initial 10 Messages
From: andrel
Subject: Re: This is cool
Date: 10 Nov 2008 16:54:38
Message: <4918ADF4.9080203@hotmail.com>
On 10-Nov-08 2:04, Darren New wrote:
> andrel wrote:
>> The only interesting way you could use such a technique to make your 
>> world a little safer might be to use it to disconnect a group of 
>> trusted  machines from the rest of the net. Then again, such 
>> techniques might not be completely new.
> 
> I think you want exactly the opposite of anonymity-enforcement for that.

My initial though was that you could use something like this to have a 
part of the internet transparently only accessible to people you trust. 
  Then again, if the group is large enough someone is going to misuse it 
and then you want to know who it was. So you're right this won't work.
But I can think of at least two groups that do want to have a separate 
part of the internet without knowing ones true identity. One will make 
the world a less safe place and the other will make it a less happy place.
In conclusion: AFAIAC this leaves the set of useful and desirable 
applications of this protocol empty. So I guess somebody will implement 
something like this.


Post a reply to this message

From: Darren New
Subject: Re: This is cool
Date: 10 Nov 2008 17:24:30
Message: <4918b49e$1@news.povray.org>
andrel wrote:
 > My initial though was that you could use something like this to have 
a part of the internet transparently only accessible to people you trust.

That's what a VPN is for. :-) And PKI certificates.

 > In conclusion: AFAIAC this leaves the set of useful and desirable 
applications of this protocol empty. So I guess somebody will implement 
something like this.

Heh heh. Sadly true.

Note that in my "this is cool" statement, I meant the techniques and 
technology, and not the particular applications. For example, the idea 
that you can get anonymity because the guy you're directly connected to 
can't tell if you're the endpoint or not is cool.

Of course, given enough laws, even this breaks down, if you can (for 
example) confiscate the entire chain of machines one at a time without 
any of them going offline long enough to alert the quarry.

-- 
Darren New / San Diego, CA, USA (PST)


Post a reply to this message

<<< Previous 10 Messages Goto Initial 10 Messages

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.