On 2004-08-04T14:50:52+0200, Zenon Panoussis wrote: > Traffic > analysis might help me figure who made a request and who served > it, but I still have to break encryption before I can figure > which file that request concerned.
That is not entirely true. The files are encrypted with keys based on the file's content. When the file content is known, then routing keys can be computed. Kendy --
Description: PGP signature
_______________________________________________ Support mailing list [EMAIL PROTECTED] http://news.gmane.org/gmane.network.freenet.support Unsubscribe at http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/support Or mailto:[EMAIL PROTECTED]