>Cant you get services to use cloaked keys? this way you can 'decrypt' the encrypted parts, allowing for proper functionality.
This only works if the encrypted IP is actually sent; if the client's
host resolves, or if the fake host is set to something else, there's no IP
information to decode in the first place.
--Andrew Church
achurch at achurch.org
http://achurch.org/