> Freenet user. And there _is_ security that makes thing impossible - hash > functions, cyphers, and even your mixnet that sent everything in
No, difficult, mathematically. Impossible, never. > keyspace. As of 0.3 we are introducing a number of keys that are > cryptographically tied to the data (CHK, SVK, see the glossary on > the page) and thus will be more or less immune to this. You mean basically do something like md5sum-ing the data so you know that somename on Server A is the same as somename on Server B? > rather then chugging away at any request. If anything the > "weakness" here is simply that the network is public. What I'm saying is that when the network is small it is more vulnerable to a large attack of clients. 60,000 bogus requests per day won't mean too much if Freenet nodes are averaging 1E+06 per day. _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev
