Author: toad
Date: 2008-03-19 13:28:11 +0000 (Wed, 19 Mar 2008)
New Revision: 18595

Modified:
   trunk/website/pages/en/faq.php
Log:
slight tweak

Modified: trunk/website/pages/en/faq.php
===================================================================
--- trunk/website/pages/en/faq.php      2008-03-19 13:27:12 UTC (rev 18594)
+++ trunk/website/pages/en/faq.php      2008-03-19 13:28:11 UTC (rev 18595)
@@ -452,7 +452,8 @@
 the Internet itself) with floods, but it is our intention to always
 keep Freenet as resistant to this as theoretically possible.</p>
 <p>Curiously enough, the above analysis only applies to <a 
href="http://wiki.freenetproject.org/Opennet";>Opennet</a>.
-On Darknet, you might have a little more success, although it would be much 
harder to change your entry point in any significant way.</p>
+On Darknet, you might have a little more success, although it would be much 
harder to change your entry point in any significant way.
+Nonetheless, you have a reasonably low bandwidth multiplier (the total number 
of nodes visited, around 20 on average).</p>

 <p><b id="hash">Why hash keys and encrypt data when a node operator could 
identify them (the data) anyway if he tried?</b><br>



Reply via email to