>From Michael Rogers <M.Rogers at cs.ucl.ac.uk>

>But if your pointer replaces a legitimate pointer with the same name, the
>file pointed to by the legitimate pointer will drop off the network due
>to lack of requests. It would be easy to censor MP3s, for example, by
>changing any KSK containing the string "mp3" that passed through your node
>to point to a nonexistent document. Unlike a black hole attack, your
>immediate neighbour would receive a file that looked OK so it wouldn't
>route around you.
>
>Michael

You can't just look around your datastore for things containing the string 
"mp3"; you have to know the exact keyname in advance.  Also, in general, 
people should be inserting their mp3s into SSKs anyway (which I believe the 
MP3 uploader program does).  KSKs are just an insecure convienence.

--
Benjamin Coates


_______________________________________________
Devl mailing list
Devl at freenetproject.org
http://lists.freenetproject.org/mailman/listinfo/devl

Reply via email to