[cryptography] Potential funding for crypto-related projects

Wasabee wasabee18 at gmail.com
Wed Jul 3 12:11:58 EDT 2013

On 03/07/2013 13:31, Michael Rogers wrote:
> Hash: SHA1
> On 03/07/13 13:26, danimoth wrote:
>> Not directly related to remailer, but what about dc nets [1] ?
>> [1] The Dining Cryptographers Problem:
>>      Unconditional Sender and Recipient Untraceability (David Chaum)
> DC nets have two major drawbacks: they don't scale, and any participant
> can anonymously jam the channel. Dissent is a recent system that aims to
> address both drawbacks:
> https://www.usenix.org/conference/osdi12/strong-scalable-anonymity-safetynet

is it really feasible to get good latency/bandwith with such system? it 
seems users need to transmit packets at the same time; so it seems the 
latency and bandwidth is a bottleneck because everyone must wait for the 
users with highest latency and lowest bandwidth? Or is there a 
scheduling mechanism involved (which would "eat up" "usable" bandwidth)?

Also, how much trust is put on servers compared to Tor? At first sight, 
it seems that the compromise of one server will compromise all clients 
connected to this server since servers knows all their shared secret.

m no expert so any explanation is very welcome!
And forgive if my questions are too basic :)

> Cheers,
> Michael
> Version: GnuPG v1.4.10 (GNU/Linux)
> sUFiZSF+pMY1VCQ8+h32emd4zZoPYOA069y/QAuBbdW1ChJCBcOPsn0trbnZGivW
> gmJyOd5llb42gDWEMe++G4tYPRvJZ8K7txyrkEqw/W8s/QRxVUOI35258tDitOKB
> I+NEK53Z0qTOpxhWRyCUgszqXn2zGeGs5h9LY1wbaSCFHpxUqQvKjZDOF49ecjjv
> M76eoCJ0OAP1b90vTc+TuPvBpxo+hTN5WcMVnBddTpe35Zt5sUIrrLlpSuHjVH8E
> JuTZwFl278ijaflBhKHtTRweBj1D3/jLXaURWuRY8MW818Q3DebUn78AX4Mu8I8=
> =0jEp
> _______________________________________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography

More information about the cryptography mailing list