[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
2013/8/25 Eugen Leitl <[email protected]>
> > For example, I think Tor may remain centralish rather than pure
> > dhtish for that purpose. But what if the centrality was undertaken
>
> If you want to scale to millions if not billions of nodes, what
> are your options?
You must have a really stupid P2P network if it doesn't scale. Can you even
still call it p2p if it doesn't scale?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20130826/3eb363b1/attachment.html>
- References:
- Lavabit and End-point Security
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)