>From Michael Rogers <M.Rogers at cs.ucl.ac.uk> >But if your pointer replaces a legitimate pointer with the same name, the >file pointed to by the legitimate pointer will drop off the network due >to lack of requests. It would be easy to censor MP3s, for example, by >changing any KSK containing the string "mp3" that passed through your node >to point to a nonexistent document. Unlike a black hole attack, your >immediate neighbour would receive a file that looked OK so it wouldn't >route around you. > >Michael
You can't just look around your datastore for things containing the string "mp3"; you have to know the exact keyname in advance. Also, in general, people should be inserting their mp3s into SSKs anyway (which I believe the MP3 uploader program does). KSKs are just an insecure convienence. -- Benjamin Coates _______________________________________________ Devl mailing list Devl at freenetproject.org http://lists.freenetproject.org/mailman/listinfo/devl
