Author: toad
Date: 2009-01-21 00:32:02 +0000 (Wed, 21 Jan 2009)
New Revision: 25162

Modified:
   trunk/website/pages/en/faq.php
Log:
Remove dubious comment


Modified: trunk/website/pages/en/faq.php
===================================================================
--- trunk/website/pages/en/faq.php      2009-01-21 00:28:49 UTC (rev 25161)
+++ trunk/website/pages/en/faq.php      2009-01-21 00:32:02 UTC (rev 25162)
@@ -521,8 +521,7 @@
 traffic analysis (basic message padding etc); if the attacker also has nodes 
on the 
 network, the extra data will likely be helpful. However on Tor-style networks,
 global traffic analysis will defeat the network completely: all that is needed 
is
-to observe both the entry and exit points. Freenet is not quite so vulnerable 
-because it doesn't use tunnels.</li>
+to observe both the entry and exit points.</li>
 <li><b>Swapping attacks</b>: It is possible to attack the swapping algorithm, 
and
 thereby disrupt the network. This has been demonstrated by the authors of the 
Pitch 
 Black paper. We are working on a solution, but this only affects the darknet 
(Friends 

_______________________________________________
cvs mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/cvs

Reply via email to