On Thu, 21 Jun 2001 11:13:45 +0200 [EMAIL PROTECTED] writes:

<snip>
I've already written a response to the arguments for GOOD behavior on
freenet, so I'm not going to respond to it again.

> Going further would it be possible to reverse engineer the 
> Freenet's
> node server to act like a normal node but for the following little
> extras:  The ability for the node owner to tell it to "goble up"
> information packets corresponding to specified key names which it 
> may
> have on the hard disk. (This order is not broadcasted onto Freenet

What do you mean by "goble up"?  Are you asking if you can tell the node
to find and delete certain files?  If so, I don't know.  I do know that
requesting a key with HTL 1 makes it so that ONLY your node recieves and
processes that request.  The rest of freenet would not recieve that
request.

> itself to avoid the propogating effect of a key request). The next 
> extra
> is that will act to any outside requests for specified keys by 
> giving a
> negative response to the request without broadcasting the request
> further.  Imagine further there a lot of such "official" nodes were 
> set
> up that they had very high bandwidth connections and large storage
> capabilities compared to the average abilities of "unofficial" 
> nodes. 

What are you talking about?  There are no "official" or "unoffical"
nodes, all nodes are run by USERS, not by the freenet development team. 
They are programers, and probably run nodes of their own, but they don't
say what node can be trusted and what node can't, or what node should be
used and what node shouldn't.  You can add any number of nodes to the
network, all that is needed is a very short list of known node addresses
of Permanent Nodes.

Some nodes are bigger and faster than others, but there is no way of know
which is which.

> Wouldn't this cripple Freenet's capabilities?  Lastly and the most
> sinsiter would be a Freenet worm or virus attack where nodes are
> directly targeted?

First of all, no freenet node is capable of running executable code that
it recieves from the network, therefore no virus or worm could possibly
work to destroy freenet.  And second, any user who runs an executable
file without useing a really good anti-virus package deserves whatever
he/she gets.  It is easy to insert a virus onto freenet, what isn't easy
is knowing whether something is infected by a virus before downloading
and scanning it.

There is a system of trust that can be set up for SSKs, but you can't
know or trust completely any KSK or CHK out there.

Well, my opinion is, give them all the amunition they want, cause they
can provide it themselves if they want to.  I've already said as much in
a previous message, but thats my opinion and I'm sticking to it.
________________________________________________________________
GET INTERNET ACCESS FROM JUNO!
Juno offers FREE or PREMIUM Internet access for less!
Join Juno today!  For your FREE software, visit:
http://dl.www.juno.com/get/tagj.

_______________________________________________
Chat mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/chat

Reply via email to