Author: toad Date: 2008-03-19 13:28:11 +0000 (Wed, 19 Mar 2008) New Revision: 18595
Modified: trunk/website/pages/en/faq.php Log: slight tweak Modified: trunk/website/pages/en/faq.php =================================================================== --- trunk/website/pages/en/faq.php 2008-03-19 13:27:12 UTC (rev 18594) +++ trunk/website/pages/en/faq.php 2008-03-19 13:28:11 UTC (rev 18595) @@ -452,7 +452,8 @@ the Internet itself) with floods, but it is our intention to always keep Freenet as resistant to this as theoretically possible.</p> <p>Curiously enough, the above analysis only applies to <a href="http://wiki.freenetproject.org/Opennet">Opennet</a>. -On Darknet, you might have a little more success, although it would be much harder to change your entry point in any significant way.</p> +On Darknet, you might have a little more success, although it would be much harder to change your entry point in any significant way. +Nonetheless, you have a reasonably low bandwidth multiplier (the total number of nodes visited, around 20 on average).</p> <p><b id="hash">Why hash keys and encrypt data when a node operator could identify them (the data) anyway if he tried?</b><br>
