On Thursday 31 January 2008 17:03, Robert Hailey wrote: > > > The attacker isn't necessarily interested in creating a dungeon > > (certainly > > not a detectable one) - he might just want to control a large region > > of the > > key space, either to monitor it or to censor selected keys, while > > responding normally to other requests. > > But creating a new subnet does not control a keyspace region, > particularly if it is correctly identified as a subnet. What it does > is create a duplicate keyspace region, which may-or-may-not be routed > into (presently the code is undecerning).
This is indeed an entirely separate question which relates to how swapping works. It should be investigated through simulations. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20080131/10c8a89a/attachment.pgp>