On Thursday 31 January 2008 17:03, Robert Hailey wrote:
> 
> > The attacker isn't necessarily interested in creating a dungeon  
> > (certainly
> > not a detectable one) - he might just want to control a large region  
> > of the
> > key space, either to monitor it or to censor selected keys, while
> > responding normally to other requests.
> 
> But creating a new subnet does not control a keyspace region,  
> particularly if it is correctly identified as a subnet. What it does  
> is create a duplicate keyspace region, which may-or-may-not be routed  
> into (presently the code is undecerning).

This is indeed an entirely separate question which relates to how swapping 
works. It should be investigated through simulations.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20080131/10c8a89a/attachment.pgp>

Reply via email to