Well, I've been thinking of a way to address the problem: does simulation mean 
anything?
It seems hard to gather information from a net built to preseve anonimity as 
far as possible but as long as we are in beta state there a are a few things 
that I think are worth considerin in order to understand how freenet works.
We (better say _you_ bacause I've got no programming skill right now) could 
produce a version of freenet that each day inserts the whole freenet.log under 
the key flog_date_nnnn where date is the gmt date and nnnn is the first number 
in the keyspace found free (i explained it very bad but i hope you got the 
idea, it's something like the in freenet indeces) the other nodes ip in 
freenet.log would be hashed and every reference to real information about the 
user (inserted or requested keys for example) would be hashed or, if 
unnecessary, removed. 
Well this would provide NSA with a lot of info but we could use them too 
gathering and comparing them daily. For example we could figure out a kind of 
map, and also see when a file was inserted and when, and where the last  requst 
for it was succesfull.
Of course there would be a secure release of the node that sends no info 
anywhere for security concerned people.
I think it would be really stupid not to use the only real source of 
information about how freenet works we have.

Bye for now

Michele




_______________________________________________
Devl mailing list
Devl at freenetproject.org
http://lists.freenetproject.org/mailman/listinfo/devl

Reply via email to