On Thursday 31 January 2008 17:03, Robert Hailey wrote:
> 
> > The attacker isn't necessarily interested in creating a dungeon  
> > (certainly
> > not a detectable one) - he might just want to control a large region  
> > of the
> > key space, either to monitor it or to censor selected keys, while
> > responding normally to other requests.
> 
> But creating a new subnet does not control a keyspace region,  
> particularly if it is correctly identified as a subnet. What it does  
> is create a duplicate keyspace region, which may-or-may-not be routed  
> into (presently the code is undecerning).

This is indeed an entirely separate question which relates to how swapping 
works. It should be investigated through simulations.

Attachment: pgpvvC9vvVFT9.pgp
Description: PGP signature

_______________________________________________
Devl mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to