> Freenet user. And there _is_ security that makes thing impossible - hash
> functions, cyphers, and even your mixnet that sent everything in 

No, difficult, mathematically. Impossible, never. 

> keyspace. As of 0.3 we are introducing a number of keys that are
> cryptographically tied to the data (CHK, SVK, see the glossary on 
> the page) and thus will be more or less immune to this.

You mean basically do something like md5sum-ing the data so you
know that somename on Server A is the same as somename on Server B?

> rather then chugging away at any request. If anything the 
> "weakness" here is simply that the network is public. 

What I'm saying is that when the network is small it is more
vulnerable to a large attack of clients. 60,000 bogus requests
per day won't mean too much if Freenet nodes are averaging
1E+06 per day.



_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to