Author: toad Date: 2009-01-21 00:32:02 +0000 (Wed, 21 Jan 2009) New Revision: 25162
Modified: trunk/website/pages/en/faq.php Log: Remove dubious comment Modified: trunk/website/pages/en/faq.php =================================================================== --- trunk/website/pages/en/faq.php 2009-01-21 00:28:49 UTC (rev 25161) +++ trunk/website/pages/en/faq.php 2009-01-21 00:32:02 UTC (rev 25162) @@ -521,8 +521,7 @@ traffic analysis (basic message padding etc); if the attacker also has nodes on the network, the extra data will likely be helpful. However on Tor-style networks, global traffic analysis will defeat the network completely: all that is needed is -to observe both the entry and exit points. Freenet is not quite so vulnerable -because it doesn't use tunnels.</li> +to observe both the entry and exit points.</li> <li><b>Swapping attacks</b>: It is possible to attack the swapping algorithm, and thereby disrupt the network. This has been demonstrated by the authors of the Pitch Black paper. We are working on a solution, but this only affects the darknet (Friends _______________________________________________ cvs mailing list [email protected] http://emu.freenetproject.org/cgi-bin/mailman/listinfo/cvs
