Part II: Applications What does Alice want to hide from Eve? The contents of her message Use cryptography PGP, S/MIME SSL IPsec The addresses on her message Use privacy-enhancing technologies Remailers PIP Networks Electronic Cash The existence of her message Use steganography