Reinventing Digital Identity . Design Goals Product Overview Technology & Cryptography Overview Question & Answer. Design Philosophy. Authenticated, secure communications are GOOD . Government & 3rd-party Certificate Authorities that force ‘True Identity’ certificates are BAD .
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Support Internet Freedom
Protect users’ privacy
Market your Internet services as ‘Privacy enhanced’
Value-added for ISP customers
Reduce liability and abuse handling associated with users’ actions
EARN REVENUE$ !
1. Client sets up anonymous route and negotiates keys with servers.
2. The first server removes one layer of encryption.
3. The next server removes a layer of encryption.
4. The final hop removes the last layer of encryption and forwards the traffic to the final destination. Traffic returning through the tunnel has data encrypted in reverse with the client removing all the layers of encryption.