On Sat, Dec 23, 2000 at 05:51:55PM -0500, Travis Bemann wrote:
> On Sat, Dec 23, 2000 at 06:34:10PM -0500, dmolnar wrote:
> > 
> > 
> > On Sat, 23 Dec 2000, Bryan Derksen wrote:
> > > 
> > > Looks like it'd be a good idea to implement node-to-node encryption sooner
> > > rather than later, otherwise as "illegal" files start getting passed
> > > around through Freenet random node owners' ISPs will be sent
> > > cease-and-desist letters because of other peoples' requests.
> > > 
> > 
> > Will node-to-node encryption really help that much? The way I read it,
> > their algorithm looks something like
> > 
> > For all nodes n in known Freenet nodes
> >     For all Bad Documents d in known Bad Documents
> >             query n for d
> >             if n responds, send ISP cease-and-desist letter
> >     end for
> > end for
> > 
> > This seems to work as long as you know the ISP used by n and as long as
> > queries work even some of the time. Whether or not n had an encrypted link
> > with another node n' when passing along the query doesn't seem as
> > relevant.
> 
> One similar tactic could be used against the users of this software.
> First, crack the software vendor's site, to get a list of sites using
> this software.  Then just crack, r00tkit, and 0wn the site as
> punishment for using this software.  Then one may decide to subtly
> corrupt the partitions at the site (it has to be subtle - there should
> be no obvious damage - but enough damage that further damage will
> later occur to the partition and the partition will eventually become
> totally unusable).

But if it appears that the site has noticed that it has been cracked,
a faster attack involving writing random 0s and 1s to random locations
in the partition should be used.

-- 
Travis Bemann
Sendmail is still screwed up on my box.
My email address is really [EMAIL PROTECTED]

PGP signature

Reply via email to