Gordon Mohr wrote:
If you receive a file with ID "allpeers:1234:5678" from anyone other
than Mr. 1234, it's hard to know it's really that file.
Hash-based identifiers are easily verifiable. If anyone gives you a
file they say is <urn:sha1:QYSLZWXFLOXO6AGNCHK57T5GB5UHCCQC>, you can
easily check.
Sure, that's understood. We actually include the hash as part of the
file metadata for verification purposes.
My question, in a nutshell was: why use
<urn:sha1:QYSLZWXFLOXO6AGNCHK57T5GB5UHCCQC> rather than just
<sha1:QYSLZWXFLOXO6AGNCHK57T5GB5UHCCQC>?
Matt
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers