On May 12, 2009, at 6:47 AM, Matthew Toseland wrote:

> ...
> So the question is, how practical is it for a mobile attacker to  
> identify a
> block in its neighbours' stores (from the bloom filter), get  
> connected to the
> neighbour's neighbours, download their bloom filters, and trace an  
> insert or
> request back to source one hop at a time?

At first thought, I would imagine if bloom filter sharing increases  
the fetch effectiveness by x20, so to it would make such an attack 20  
times easier. A powerful attacker might track ~everyone's~ bloom  
filter!!!!

What would the security implications be if we were to have the node  
with the store check the bloom filter rather than sharing it (~one-hop- 
probe~)? Would that buy us anything, being able to mete out bloom  
filter checks? Then such an attacker could not check to see if we  
contained ~80% of a split file because he would have to ask us to  
check our bloom filter for so many keys. It would also be an order of  
magnitude easier to implement than "sharing".

--
Robert Hailey


_______________________________________________
Devl mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to