On Mon, Apr 23, 2001 at 11:29:41PM -0000, David Childers wrote: > > >Yes, but weakening the system for people who don't care at the expense of > >those that do is never an option. > > The means of security is * not * knowing where the data is stored, in > addition to the requester of the information being masked. > > If you analyze traffic flow through enough nodes at various points, > you have a reasonably good map of the network. ( Port scanners and > sniffers are a dime a dozen for any operating system. ) Maybe. With 0.4, we can do "silent bob" steganography, which makes portscanning
- [freenet-devl] streaming media on freenet Brandon
- [freenet-devl] streaming media on freenet Scott G. Miller
- [freenet-devl] streaming media on freenet Brandon
- [freenet-devl] streaming media on freenet Tavin Cole
- [freenet-devl] streaming media on freenet thelema
- [freenet-devl] streaming media on fre... Don Marti
- [freenet-devl] streaming media o... Mr.Bad
- [freenet-devl] streaming med... Peter Todd
- [freenet-devl] streaming media o... Peter Todd
- [freenet-devl] streaming media on freenet David Childers
- [freenet-devl] streaming media on freenet toad
- [freenet-devl] streaming media on freenet Scott G. Miller
- [freenet-devl] streaming media on freenet Darren Smith
- [freenet-devl] streaming media on freenet W. Eric C. Ferguson
