On Saturday 02 February 2008 16:24, Michael Rogers wrote:
> Robert Hailey wrote:
> > Unless [in a later implementation] DNFs (maybe weighed against HTL) 
> > become an indication of a separate network. Then it would do precisely 
that.
> 
> DNFs would detect a "black hole" attacker - what about an attacker who 
> just wants to monitor a region of the key space or censor a few selected 
> keys?
> 
> (Again, this criticism isn't specific to your proposal and I'm not 
> saying your proposal creates this problem.)

Swapping creates this problem. Or does it? Could you perhaps do some 
simulations of two networks of different sizes weakly linked and show whether 
they get independant location spaces, or whether swapping tries to put one of 
them within the global keyspace for the other?

Attachment: pgpgTlVTMUPjs.pgp
Description: PGP signature

_______________________________________________
Devl mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to