Well, I've been thinking of a way to address the problem: does simulation mean 
anything?
It seems hard to gather information from a net built to preseve anonimity as far as 
possible but as long as we are in beta state there a are a few things that I think are 
worth considerin in order to understand how freenet works.
We (better say _you_ bacause I've got no programming skill right now) could produce a 
version of freenet that each day inserts the whole freenet.log under the key 
flog_date_nnnn where date is the gmt date and nnnn is the first number in the keyspace 
found free (i explained it very bad but i hope you got the idea, it's something like 
the in freenet indeces) the other nodes ip in freenet.log would be hashed and every 
reference to real information about the user (inserted or requested keys for example) 
would be hashed or, if unnecessary, removed. 
Well this would provide NSA with a lot of info but we could use them too gathering and 
comparing them daily. For example we could figure out a kind of map, and also see when 
a file was inserted and when, and where the last  requst for it was succesfull.
Of course there would be a secure release of the node that sends no info anywhere for 
security concerned people.
I think it would be really stupid not to use the only real source of information about 
how freenet works we have.

Bye for now

Michele




_______________________________________________
Devl mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/devl

Reply via email to