On Friday 03 October 2003 02:02 pm, Toad wrote:
> > Fair enough. While all of the above could be done without collecting that
> > data, it would be better if it was available. I say this because it
> > requires a much lower level of trust to give someone your "10 points"
> > routing estimate
>
> Does it? With enough observations an attacker could reconstruct your
> estimators perhaps... this may be a flaw in the idea I suggested just
> now on this thread.

I don't think this is a serious attack. If you only give out the information 
when a node first connects to you, in order to know what keys are passing 
through your node, an attacker would have to have nodes connecting to your 
node as fast as you are processing data. This would be hard to pull of 
because setting up a connection takes much longer than processing a request. 
Never the less, if someone did this they would rapidly replace all your other 
connections, so you would not be processing any data, unless they were 
requesting it. 

Besides this sort of thing is very easy to obscure, just give them rounded, 
approximate, smoothed, or out of date information. The easiest way would be 
to come up with some faster formula, that approximates your 10 points but 
doesn't require processing all the incoming data.
_______________________________________________
Devl mailing list
[EMAIL PROTECTED]
http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to