Well, I've been thinking of a way to address the problem: does simulation mean anything? It seems hard to gather information from a net built to preseve anonimity as far as possible but as long as we are in beta state there a are a few things that I think are worth considerin in order to understand how freenet works. We (better say _you_ bacause I've got no programming skill right now) could produce a version of freenet that each day inserts the whole freenet.log under the key flog_date_nnnn where date is the gmt date and nnnn is the first number in the keyspace found free (i explained it very bad but i hope you got the idea, it's something like the in freenet indeces) the other nodes ip in freenet.log would be hashed and every reference to real information about the user (inserted or requested keys for example) would be hashed or, if unnecessary, removed. Well this would provide NSA with a lot of info but we could use them too gathering and comparing them daily. For example we could figure out a kind of map, and also see when a file was inserted and when, and where the last requst for it was succesfull. Of course there would be a secure release of the node that sends no info anywhere for security concerned people. I think it would be really stupid not to use the only real source of information about how freenet works we have.
Bye for now Michele _______________________________________________ Devl mailing list Devl at freenetproject.org http://lists.freenetproject.org/mailman/listinfo/devl
