On Monday 18 August 2008 21:32, [EMAIL PROTECTED] wrote: > I personally like that concept and especially the texts below very much, > well done! They explain the current scope and a class where the user > might find himself targetted. > > Although I would like some more details what is done at which level; so, > which precautins become active, what is changed between levels, etc, > like it's done with the Physical Threat Level: tempfile encryption on > (high and off (low). So examples would be, when is FOAF active? what > informations are shared? what is active in other levels? > > Maybe just too detailed would be an advanced view which displays > affected configuration parameters, but I think the former, symptomatic > description, is needed.
The detail is likely to change as we add more details e.g. tunnels, random-encrypted splitfiles, etc.
pgppqXY1wwVFc.pgp
Description: PGP signature
_______________________________________________ Devl mailing list [email protected] http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
