(no subject)

Jul 14, 2005 18:10

Imagine if you wanted to send a message to someone, but you were worried that someone would intercept the message. So you sent each letter of the message to a different person, and instructed them to send it to another person, who had instructions to send it to the person you wanted it to get to. Now, when the person who wanted the message from you starts getting all the letters, he can do timestamping and other verification techniques with an office that can arrange the letters for them, even though they do not have the message.

Seem ridiculous? Not if you're a computer. Welcome to I2P

This is the new technology that the latest bittorrent clients support for true anonyminity.
Previous post Next post
Up