Quote:
Originally Posted by Terran
How does this technology fit into a security concept? I think it's counterproductiv as you as the security administrator want to know who is accessing your systems...
|
read the link, sender and recipient know each other, but all transit-network equipment only knows the addresse for its own path (A-B).
the trafic delegation(routing) works by encapsulating the payload for each hop into an extra packet. each step uses encryption which assures that the routers can onyl read the address for the next hop.
Jana-proxy also uses that techniqe, even cleaner implementet (why they are not afraid of any patent, which is nonsense btw because it is allready described in the 1981 studies).
cheers