On Friday 03 October 2003 02:02 pm, Toad wrote: > > Fair enough. While all of the above could be done without collecting that > > data, it would be better if it was available. I say this because it > > requires a much lower level of trust to give someone your "10 points" > > routing estimate > > Does it? With enough observations an attacker could reconstruct your > estimators perhaps... this may be a flaw in the idea I suggested just > now on this thread.
I don't think this is a serious attack. If you only give out the information when a node first connects to you, in order to know what keys are passing through your node, an attacker would have to have nodes connecting to your node as fast as you are processing data. This would be hard to pull of because setting up a connection takes much longer than processing a request. Never the less, if someone did this they would rapidly replace all your other connections, so you would not be processing any data, unless they were requesting it. Besides this sort of thing is very easy to obscure, just give them rounded, approximate, smoothed, or out of date information. The easiest way would be to come up with some faster formula, that approximates your 10 points but doesn't require processing all the incoming data. _______________________________________________ Devl mailing list [EMAIL PROTECTED] http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl
