>> >But the key probing >> >attack still remains, and it's a question of how much we care about the >> >ability for a node to effectively ask your node whether it has a given >> >key in its store - how much of a vulnerability is that? >>=20 >> Indeed: how much? My contention is that when going against the AAIR or= >=20 >> the RIAA, it's a big vulnerability. > >Well, it's a legal question as much as a technical question. Will you >get into trouble because the file was there, irrespective of whether it >was you that downloaded it? If so, you will probably get into trouble >even if they caused it to be there, and Freenet will eventually be found >to be illegal.
you can easily insert any "bad content" you want at a node of somebody you don't like. all you need is to know his/her node ip:port (maybe from RT), empty your local RT leaving only this one entry left and insert the "bad content" wit htl=1. viola. your victim now has the stuff you want it to have. repeat for all splitfile blocks and the splitfile map and call the goons to have a visit at your victim's home. and now; how does the victim deny it has not requested the file?? _______________________________________________ Devl mailing list [EMAIL PROTECTED] http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl
