Working out whether or not a design is vulnerable to various attacks is complicated... When hashed file storage is isolated from Freenet into a separate network of nodes ostensibly devoted to research into hash collisions (call it SETHC, the Search for Extra Terrestrial Hash Collisions), we need some way to be able to translate a CHK into one or another pair of SETHC hash codes. But yet this translation _must_ remain secret, or else someone can request deletion of the hash codes. I think there must be a way to do that, using an intermediate server which forwards the request to SETHC in an anonymous way.
-- Ed Huff _______________________________________________ devl mailing list devl at freenetproject.org http://hawk.freenetproject.org:8080/cgi-bin/mailman/listinfo/devl
