On Thursday 27 August 2009 18:45:33 Michael Yip wrote:
> Hi Ian,
> 
> My name is Michael and for my MSc project, I have to run some 
> experiments on Freenet to measure and quantify the amount of information 
> an eavesdropper can get from observing the HTL and key closeness of 
> requests.

Ooooh, a correlation attack (my peer P looks like he is requesting file X 
because he has requested a large proportion of the file) or mobile-attacker 
source tracing? The latter is pretty scary on opennet IMHO.

(Read the attacks section in the FAQ)
> 
> I was wondering if you could give me some pointers on my development.
> 
> Basically, to do this, I'm writing a FCP client to upload files to a 
> node. I'm experiencing difficulties in this. Below is a step by step 
> view of what I want to achieve:
> 
> 1. Send ClientHello and receive NodeHello reply
> 2. Read all the existing Persistent requests
> 3. Send my own requests.
> 
> I can't seem to move from step 2 to step 3 as I don't know how many 
> Persistent requests there are and since most messages end with 
> EndMessage, I can't use that to determine if that's the end of the list 
> of Persistent requests.
> 
> How may I achieve this?
> 
> Thank you very much for your kind attention.
> 
> Best regards,
> 
> Michael Yip
> MSc Computer Security
> University of Birmingham
> 
> 
> 
> _______________________________________________
> Devl mailing list
> Devl at freenetproject.org
> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
> 
> 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 835 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20090827/39f772cd/attachment.pgp>

Reply via email to