On Thu, Sep 18, 2003 at 10:28:21AM +0200, Thomas Leske wrote:
> Ian Clarke wrote:
> >It certainly seems to have a very nice UI, but the most important 
> >question is how does it find data efficiently and in a scalable manner 
> >while preserving anonymity - and for the life of me I can't find an 
> >answer to that question anywhere on their site.
> 
> From what I have found on their site nodes publish their own "fingerprints"
> (the specialisation of the node). The fingerprint is not scale free but 
> divides
> the key space in 16 parts. (http://entropy.stop1984.com/en/entropy.html,
> section: Peer incoming connections listener)
> 
> Node announcements do not determine the specialisation. They are published 
> under
> well known and time depended KSKs (section: Peer outgoing connections 
> launcher).
> 
> There was not any information on how routing exactly works. However because 
> a
> cancer node seems to easily make other nodes route requests to it, entropy
> does not preserve anonymity well and is not resistant to censorship.

Whereas Fred is completely immune to cancer node attacks? </sarcasm>
Cancer nodes are probably THE hardest attack to deal with...
> 
> --
>  Thomas
> 
> _______________________________________________
> Devl mailing list
> [EMAIL PROTECTED]
> http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Devl mailing list
[EMAIL PROTECTED]
http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to