Ludovic Courtès wrote: > Hello! > > Loic Dachary <[email protected]> writes: > > >> The context in which I am exploring this topic is a collaborative search >> software ( http://seeks-project.info/ ). >> > > Heh, good to learn. ;-) > > Indeed, I think there are application-specific security concerns, e.g., > search keyword poisoning: a malicious party could attempt to pollute the > search results for given keyword. > > GNUnet’s anonymous file sharing encoding/protocol (ECRS) prevents users > from replying random data to keyword searches [0]. I think it can’t > directly prevent users from inserting arbitrary content under popular > keywords, though, but the fact that content replication is partly > demand-driven may mitigate it. > > It looks like compromise is in order, indeed.
The key question, it seems, is :
* given the most frequent use cases of the collaborative search software
* given the known security issues that threaten any DHT + those
specific to the application
* given the existing counter measures (ECRS among others)
=> is it likely that users will be able to effectively use the software
or will they be disrupted
by security problems at a frequency that will be discouraging for
most ?
Maybe it is a naïve way to approach the problem. I'm struggling to find
a way to understand this topic and your help is much appreciated :-)
> YaCy may also address some of the concerns you may have [1].
>
I did not see anything related to resolving security issues in YaCy, but
it was my first exploration and I may have missed the relevant part. Did
you think of something specific ?
Cheers
<<attachment: loic.vcf>>
signature.asc
Description: OpenPGP digital signature
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
