On Thursday 31 January 2008 17:03, Robert Hailey wrote: > > > The attacker isn't necessarily interested in creating a dungeon > > (certainly > > not a detectable one) - he might just want to control a large region > > of the > > key space, either to monitor it or to censor selected keys, while > > responding normally to other requests. > > But creating a new subnet does not control a keyspace region, > particularly if it is correctly identified as a subnet. What it does > is create a duplicate keyspace region, which may-or-may-not be routed > into (presently the code is undecerning).
This is indeed an entirely separate question which relates to how swapping works. It should be investigated through simulations.
pgpvvC9vvVFT9.pgp
Description: PGP signature
_______________________________________________ Devl mailing list [email protected] http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
