Author: toad
Date: 2007-12-11 15:58:44 +0000 (Tue, 11 Dec 2007)
New Revision: 16490

Modified:
   trunk/website/pages/en/faq.php
Log:
split, format, elaborate, edit

Modified: trunk/website/pages/en/faq.php
===================================================================
--- trunk/website/pages/en/faq.php      2007-12-11 15:54:34 UTC (rev 16489)
+++ trunk/website/pages/en/faq.php      2007-12-11 15:58:44 UTC (rev 16490)
@@ -419,21 +419,18 @@
 forwarding these requests for some other node. Unfortunately, your peers can 
do 
 <a href="http://wiki.freenetproject.org/CorrelationAttacks";>correlation 
 attacks</a> to figure out which requests are from you and which requests are 
from
-your peers or somebody else. One key thing you can do to protect yourself is
-to get lots of <a href="http://127.0.0.1:8888/friends/";>"Friends"</a>
+your peers or somebody else. These attacks rely on the attacker knowing what
+the keys are for, and there being lots of them, so for example, a big 
splitfile, 
+a big freesite inserted regularly, a Frost poster maybe who uploads files 
too.</p>
+<p>At the moment, the most important thing you can do to protect yourself is 
to 
+get lots of <a href="http://127.0.0.1:8888/friends/";>"Friends"</a>
 aka <a href="http://wiki.freenetproject.org/DarkNet";>darknet</a> connections:
-these are permanent, fixed connections to people you actually know. This 
-greatly limits your exposure as your attacker will need to get connected to 
-you in order to attack you, however on <a 
href="http://wiki.freenetproject.org/OpenNet";>
-opennet</a> aka the <a href="http://127.0.0.1:8888/strangers/";>Strangers</a> 
-network, he can get connected very easily. The whole darknet model assumes 
-that attacking the social network is far more expensive than 
-<a href="http://wiki.freenetproject.org/NodeHarvesting";>harvesting</a>
-opennet nodes and connecting to them (or blocking them to attack the whole 
-network; the Chinese firewall for example blocks Freenet 0.5). Anyway, once an
-attacker manages to connect to you, he can probably work out what you are 
-uploading/downloading, especially if it consists of large files or other 
-content that can be correlated over the long-term such as a frost identity.</p>
+these are permanent, fixed connections to people you actually know. Once you 
have 
+enough, you can turn off <a 
href="http://wiki.freenetproject.org/OpenNet";>opennet</a>,
+and only connect to people you know. This makes it very much more expensive 
for an 
+attacker, as he has to infiltrate the social network, rather than just 
+<a href="http://wiki.freenetproject.org/NodeHarvesting";>harvesting</a> the 
opennet
+and connecting to nodes (which is technically very easy).
 <p>The only way that you can offer true
 anonymity is if the client can directly control the routing of data,
 and thus encrypt it with a series of keys of the nodes it will pass


Reply via email to