I mean, we are caching them if they come in from the network with no client involvement, but caching ones that have only been through the client in the local encrypted store. That way, they wouldn't look any different than the rest of the keyspace. See my other mail.
Ah, for that you should see my first mail on this subject. I spell out there how if we do what you suggest, then two nodes, B and C, might conspire together and then use a timing attack to determine that we are hiding certain keys. Read my much earlier mail (the one that started it all I think) and let me know if you have questions.
-Martin
_______________________________________________ Devl mailing list [EMAIL PROTECTED] http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl
