I will write the alpha. If the goal is to recognize a neighbor as a trusted source, but not store their IP addresses, you use that method. Then whoever obtains your trust list, obtains useless information. They must be in the same physical area as you, in order to begin talking to the same neighbors, then it can hash the IP addresses, and recognize who they trust. The only reason for the trust is to increase performance, by only randomly authenticating files, instead of authenticating all of them. -----Original Message----- From: john kawakami [mailto:[EMAIL PROTECTED]] Sent: Sunday, May 13, 2001 8:07 PM To: [EMAIL PROTECTED] Subject: RE: [freenet-tech] RE: [freenet-chat] RE: I've designed a global file system,... How do you hash an IP securely, yet uniquely? If you, say, MD5 it, you can make a list which maps MD5 hashes back to IPs. If you throw in a random, then, why not simply use a random number as the hash - keep the IP->random table in memory, and flush entries when the IPs go dead for a while. >I also only store IP addresses in their hashed form, when they are being >stored permanently. > >By doing so, you can later recognize if the IP address is the same, which is >all that's needed. >This method allows for somebody to steal your hashed IP address, and it will >take a lot to do a brute force attack to figure it out, especially if a >timestamp is thrown in to randomize it. > >That's an example of how I respect the individuals privacy, but still get >the system to function when it simply must identify somebody in order to >accomplish its job.I've had to think about this a lot, because the file >system basically monitors what you do, FOR PERFORMANCE REASONS.Because >people are creatures of habit, there are patterns. Once detected, the >patterns can trigger pre-loading of files into the cache, that are PREDICTED >to be accessed. Local file system's will forever outperform network file >systems. > >My goal is performance, not auditing. It's designed so that the information >that is stolen from it is essentially useless. > > > > -----Original Message----- >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] >On Behalf Of [EMAIL PROTECTED] >Sent: Sunday, May 13, 2001 6:31 PM >To: [EMAIL PROTECTED] >Subject: Re: [freenet-tech] RE: [freenet-chat] RE: I've >designed a global >file system,... > >Im not a freenet developer (let me make that clear), im just a sort of >monitoring conversations for something interesting. > >I have to say that a centralized security system is not going to work to >well, it will have the same problems as Napster, take out the centralized >system you destroy the network. The point of decentralized is so that the >network still exists/works even if you take out the big boys in the network. > >I also monitor the JXTA mailing list for interesting discussions and one of >the discussions that came up was distributed security or distributed trust. >Think of that old saying, you can fool most of the people some of the time >and you can fool some of the people most of the time *but you can not fool >all of the people all of the time*. The basis is that a P2P trust system >could be built. The only issues that arise after this is not so much if an >peer is trying to fool you, but if there is a conspiracy. The other thing >that comes up, is reputation, using repuation to know whether someone is a >good source of information or a bad source of information, reputation does >not mix with anonymity. You might want to read through the JXTA mailing >list, >if not for the protocol of JXTA for the discussions there in. > >The way I see it though, is to give government no basis for information >property, create a network that pays publishers/content creators (as well as >computers to process data), and the excuse that they need a monopoly goes >away, and gives an easier job to acedemics lawyers and politicians to get it >abolished. I have presented my idea on how such a thing could be achieved in >this mailing list once in the past and in JXTA some time ago. > >Leyland Needham > >_______________________________________________ >freenet-tech mailing list >[EMAIL PROTECTED] >http://lists.freenetproject.org/mailman/listinfo/tech > > >_______________________________________________ >freenet-tech mailing list >[EMAIL PROTECTED] >http://lists.freenetproject.org/mailman/listinfo/tech -- _______________________________________________ Chat mailing list [EMAIL PROTECTED] http://lists.freenetproject.org/mailman/listinfo/chat
