>> >But the key probing
>> >attack still remains, and it's a question of how much we care about the
>> >ability for a node to effectively ask your node whether it has a given
>> >key in its store - how much of a vulnerability is that?
>>=20
>> Indeed: how much?  My contention is that when going against the AAIR or=
>=20
>> the RIAA, it's a big vulnerability.
>
>Well, it's a legal question as much as a technical question. Will you
>get into trouble because the file was there, irrespective of whether it
>was you that downloaded it? If so, you will probably get into trouble
>even if they caused it to be there, and Freenet will eventually be found
>to be illegal.

you can easily insert any "bad content" you want at a node of somebody you don't like.
all you need is to know his/her node ip:port (maybe from RT), empty your local RT 
leaving only this one entry left and insert the "bad content" wit htl=1.
viola. your victim now has the stuff you want it to have.
repeat for all splitfile blocks and the splitfile map and call the goons to have a 
visit at your victim's home.

and now; how does the victim deny it has not requested the file??


_______________________________________________
Devl mailing list
[EMAIL PROTECTED]
http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to