Author: toad Date: 2007-12-11 15:54:34 +0000 (Tue, 11 Dec 2007) New Revision: 16489
Modified: trunk/website/pages/en/faq.php Log: harvesting etc Modified: trunk/website/pages/en/faq.php =================================================================== --- trunk/website/pages/en/faq.php 2007-12-11 15:51:48 UTC (rev 16488) +++ trunk/website/pages/en/faq.php 2007-12-11 15:54:34 UTC (rev 16489) @@ -426,10 +426,14 @@ greatly limits your exposure as your attacker will need to get connected to you in order to attack you, however on <a href="http://wiki.freenetproject.org/OpenNet"> opennet</a> aka the <a href="http://127.0.0.1:8888/strangers/">Strangers</a> -network, he can get connected very easily. Once he does manage to -connect to you, he can probably work out what you are uploading/downloading, -especially if it consists of large files or other content that can be correlated -over the long-term such as a frost identity.</p> +network, he can get connected very easily. The whole darknet model assumes +that attacking the social network is far more expensive than +<a href="http://wiki.freenetproject.org/NodeHarvesting">harvesting</a> +opennet nodes and connecting to them (or blocking them to attack the whole +network; the Chinese firewall for example blocks Freenet 0.5). Anyway, once an +attacker manages to connect to you, he can probably work out what you are +uploading/downloading, especially if it consists of large files or other +content that can be correlated over the long-term such as a frost identity.</p> <p>The only way that you can offer true anonymity is if the client can directly control the routing of data, and thus encrypt it with a series of keys of the nodes it will pass
