On Thu, Sep 18, 2003 at 10:28:21AM +0200, Thomas Leske wrote: > Ian Clarke wrote: > >It certainly seems to have a very nice UI, but the most important > >question is how does it find data efficiently and in a scalable manner > >while preserving anonymity - and for the life of me I can't find an > >answer to that question anywhere on their site. > > From what I have found on their site nodes publish their own "fingerprints" > (the specialisation of the node). The fingerprint is not scale free but > divides > the key space in 16 parts. (http://entropy.stop1984.com/en/entropy.html, > section: Peer incoming connections listener) > > Node announcements do not determine the specialisation. They are published > under > well known and time depended KSKs (section: Peer outgoing connections > launcher). > > There was not any information on how routing exactly works. However because > a > cancer node seems to easily make other nodes route requests to it, entropy > does not preserve anonymity well and is not resistant to censorship.
Whereas Fred is completely immune to cancer node attacks? </sarcasm> Cancer nodes are probably THE hardest attack to deal with... > > -- > Thomas > > _______________________________________________ > Devl mailing list > [EMAIL PROTECTED] > http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl -- Matthew J Toseland - [EMAIL PROTECTED] Freenet Project Official Codemonkey - http://freenetproject.org/ ICTHUS - Nothing is impossible. Our Boss says so.
signature.asc
Description: Digital signature
_______________________________________________ Devl mailing list [EMAIL PROTECTED] http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl
