-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/31/2012 07:04 AM, Joe Zeff wrote: > On 05/30/2012 08:01 PM, Tim wrote: >> On the one hand, it says calls do not pass through it (it just >> organises the two parties to connect to each other). And, on the >> other hand, it talks about not exposing the calling party's IPs, >> which is an impossible thing to do for peer-to-peer. The only >> way to hide the IPs is to have at least one proxy in the middle, >> where the entire call passes through. > > Before it can connect the two parties, it has to know both of their > IP addresses even if the call is managed peer-to-peer once the > connection is made. Although skype probably has this requirement it's not true in the general case. There are methods available that allow two mutually-anonymous parties to set up a rendezvous via (also anonymous and untrusted) third parties in such a way that no party can discover the network identity of the others or eavesdrop on the resulting communications. The TOR hidden service model implements this via rendezvous and introduction points that allow nodes to discover and connect to published hidden services. Regards, Bryn. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk/HXTkACgkQ6YSQoMYUY961vACgxQwTPrAEHoPP/g5Rycj2jxm0 a1cAniAb39mT8LBQptGx1Y35R+UeO4+n =91dr -----END PGP SIGNATURE----- -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org