Methods and apparatus for secure communications. The techniques feature
receiving over the first connection a login credential for the server,
generated by the server without the use of any information identifying a
computer user. The techniques further feature establishing a second
secure connection with the server using a secure protocol and the login
credential provided by the server.