On Sat, Dec 23, 2000 at 05:51:55PM -0500, Travis Bemann wrote:
> On Sat, Dec 23, 2000 at 06:34:10PM -0500, dmolnar wrote:
> >
> >
> > On Sat, 23 Dec 2000, Bryan Derksen wrote:
> > >
> > > Looks like it'd be a good idea to implement node-to-node encryption sooner
> > > rather than later, otherwise as "illegal" files start getting passed
> > > around through Freenet random node owners' ISPs will be sent
> > > cease-and-desist letters because of other peoples' requests.
> > >
> >
> > Will node-to-node encryption really help that much? The way I read it,
> > their algorithm looks something like
> >
> > For all nodes n in known Freenet nodes
> > For all Bad Documents d in known Bad Documents
> > query n for d
> > if n responds, send ISP cease-and-desist letter
> > end for
> > end for
> >
> > This seems to work as long as you know the ISP used by n and as long as
> > queries work even some of the time. Whether or not n had an encrypted link
> > with another node n' when passing along the query doesn't seem as
> > relevant.
>
> One similar tactic could be used against the users of this software.
> First, crack the software vendor's site, to get a list of sites using
> this software. Then just crack, r00tkit, and 0wn the site as
> punishment for using this software. Then one may decide to subtly
> corrupt the partitions at the site (it has to be subtle - there should
> be no obvious damage - but enough damage that further damage will
> later occur to the partition and the partition will eventually become
> totally unusable).
But if it appears that the site has noticed that it has been cracked,
a faster attack involving writing random 0s and 1s to random locations
in the partition should be used.
--
Travis Bemann
Sendmail is still screwed up on my box.
My email address is really [EMAIL PROTECTED]
PGP signature