On Wed, Jun 14, 2006 at 10:01:00PM +0100, Michael Rogers wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Matthew Toseland wrote: > > If only the original requester slows down in response to relayed > > RejectedOverload's. Which is the case now. > > Sneaky :-) But in order to exploit that information, wouldn't you have > to be able to tell that a series of requests came from the same sender? > In which case wouldn't you already be able to perform a statistical > attack to estimate how close you were to the sender?
You might be able to do some kind of timing attack. It seems dangerous... > > Cheers, > Michael -- Matthew J Toseland - [EMAIL PROTECTED] Freenet Project Official Codemonkey - http://freenetproject.org/ ICTHUS - Nothing is impossible. Our Boss says so.
signature.asc
Description: Digital signature
_______________________________________________ Devl mailing list [email protected] http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
