Toad wrote:

But the key probing
attack still remains, and it's a question of how much we care about the
ability for a node to effectively ask your node whether it has a given
key in its store - how much of a vulnerability is that?

Indeed: how much? My contention is that when going against the AAIR or the RIAA, it's a big vulnerability.


there may or may not be the possibility that there is a
node with a degenerate routing table routing all its requests to your
node which actually asked for it, that is one possible defence.

Hmm, that is tempting. But I'm can't be truly comfortable with that defense: it doesn't pass the laugh test. A good plaintiff attorney could probably convince a jury that the chances of that happening are too remote to consider. The only way I can see this working would be to intentionally code freenet such that some nodes do indeed route all requests to one other node. Hopefully we can find a more elegant solution than that.


-Martin


_______________________________________________ Devl mailing list [EMAIL PROTECTED] http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to