On Wed, Jun 14, 2006 at 10:01:00PM +0100, Michael Rogers wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Matthew Toseland wrote:
> > If only the original requester slows down in response to relayed
> > RejectedOverload's. Which is the case now.
> 
> Sneaky  :-)  But in order to exploit that information, wouldn't you have
> to be able to tell that a series of requests came from the same sender?
> In which case wouldn't you already be able to perform a statistical
> attack to estimate how close you were to the sender?

You might be able to do some kind of timing attack. It seems
dangerous...
> 
> Cheers,
> Michael
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Devl mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to