In a somewhat strange mood, I added a subdirectory in Freenet.contrib
called attacks, which can/will/does contain source code to possible
attacks on Freenet. 

Then, just for fun, I wrote a Man-in-the-middle attack utility that
demonstrates the fun, as well as acts as a very nice debugging aid.  It
works by accepting connections from Alice, negotiating crypto, then
connecting to Bob, negotiating crypto, then ferrying data between them
unaware, also logging to specified files. 

 Scott

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20000523/97fc6eed/attachment.pgp>

Reply via email to