Gordon Mohr wrote:
If you receive a file with ID "allpeers:1234:5678" from anyone other than Mr. 1234, it's hard to know it's really that file.

Hash-based identifiers are easily verifiable. If anyone gives you a file they say is <urn:sha1:QYSLZWXFLOXO6AGNCHK57T5GB5UHCCQC>, you can easily check.
Sure, that's understood. We actually include the hash as part of the file metadata for verification purposes.

My question, in a nutshell was: why use <urn:sha1:QYSLZWXFLOXO6AGNCHK57T5GB5UHCCQC> rather than just <sha1:QYSLZWXFLOXO6AGNCHK57T5GB5UHCCQC>?

Matt
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to