Browsing: Implementing the Cryptographic Cloak