At 09:15 AM 8/21/2009, Evan Daniel wrote: >On Fri, Aug 21, 2009 at 8:54 AM, Victor Denisov<vdeni...@redline.ru> wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA1 > > > > Luke771 wrote: > >> What you're doing here is catching Opennet users. Pure Darknet users > >> wont be that easy to catch. > > > > No, they'll be extremely easy to catch, along with their friends' IP > > addresses. Detect local darknet nodes via generic traffic analysis (how > > many people skype or play online games for 20+ hours a day with constant > > 80+ KB/sec traffic?) -> Check local port used for conversations -> find > > local nodes' darknet port -> detect its darknet peers. Trivial. > > > > On the other hand, moving just one hop further in the darknet chain > > requires cooperation with the remote ISP, which is something everyone > > considers to be relatively difficult to achieve. > >Right now, the best defense for darknet nodes is that this sort of >analysis is computationally expensive on a large network. For a small >lan, it probably isn't, making even darknet relatively easy to catch.
Freenet (or whatever) users could just route all of their traffic through a proxy via securely-encrypted VPN, such as XeroBank with OpenVPN. Although you'd still know that they were hogging bandwidth, you wouldn't have a clue what they were doing with it. = Jim Cook <jimc...@panix.com> _______________________________________________ Support mailing list Support@freenetproject.org http://news.gmane.org/gmane.network.freenet.support Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support Or mailto:support-requ...@freenetproject.org?subject=unsubscribe