1. 21
    The Internet is Broken: Idealistic Ideas for Building a GNU Network pdf networking privacy security web w3.org
    1. 5

      If the content of packets isn’t available until the target machine, doesn’t that eliminate any way of limiting damaging traffic and put it all on the target machine to withstand?

      1. 2

        I don’t think so, although it would require your DoS protection service to have your private keys, effectively pretending to be the destination machine. But that pretty much happens anyway.

        1. 1

          Could this be another application for homomorphic encryption?