On Sun, May 04, 2003 at 08:34:55AM -0400, Edward J. Huff wrote:
> On Sat, 2003-05-03 at 19:31, Hui Zhang wrote:
> > > How do I trust the legitimacy of a given formula?
> > > What prevents an
> > > attacker from advertising tons of false formulas for
> > > a file?
> > 
> > This is a very convincing argument. If multiple
> > versions are allowed for a single file, then it brings
> > the problem of inauthentic upload.
> > 
> Lets call useful content (text, sound, images) "documents"
> and reserve the word "file" for the actual files on a
> freenet node, which would be fixed length and apparently
> random content.
> 
> There are multiple ways to calculate a given document,
> but the result is always exactly the same.  If someone 
> gives a false formula, it is obvious both that it is 
> false, and who is lying, since nodes would be required 
> to sign the statement that they encrypted a particular 
> file with a particular key giving a different file, 
> where the files are identified by their hash.

NODES?!!! We do NOT under ANY circumstances want to associate NODES with
documents they uploaded...

> 
> As for the question of whether the very first formula
> for a given content is correct, that is no different
> from uploading junk into a CHK and linking to it from
> a freesite claiming it is a certain movie.

No, it's totally different, because we know what the original CHK was,
and we can verify it. An attacker will simply flood the system with
bogus formulas - if we have to verify them, we will either generate
enormous and ultimately unscalable levels of traffic, or we will break
our plausible deniability by only passing on formulas we have verified
ourself.
> 
> -- Ed Huff
_______________________________________________
devl mailing list
devl at freenetproject.org
http://hawk.freenetproject.org:8080/cgi-bin/mailman/listinfo/devl

Reply via email to