[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
On Sun, Aug 25, 2013 at 5:39 PM, Lodewijk andré de la porte
<[email protected]> wrote:
>...
> You must have a really stupid P2P network if it doesn't scale. Can you even
> still call it p2p if it doesn't scale?
replicate broadcast functionality (most suited to wireless
transmissions) in the unicast datagram model and you have p2p that
doesn't scale. remember first gen gnutella?
- References:
- Lavabit and End-point Security
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)
- NSLs, gag-orders, code-changes, coerced backdoors - any tech response? (Re: Lavabit and End-point Security)