Working out whether or not a design is vulnerable to various attacks is
complicated...  When hashed file storage is isolated from Freenet into a
separate network of nodes ostensibly devoted to research into hash
collisions (call it SETHC, the Search for Extra Terrestrial Hash
Collisions), we need some way to be able to translate a CHK into one or
another pair of SETHC hash codes.  But yet this translation _must_
remain secret, or else someone can request deletion of the hash codes. 
I think there must be a way to do that, using an intermediate server
which forwards the request to SETHC in an anonymous way.

-- Ed Huff

_______________________________________________
devl mailing list
devl at freenetproject.org
http://hawk.freenetproject.org:8080/cgi-bin/mailman/listinfo/devl

Reply via email to