--* Timm Murray (Mon, Dec 17, 2001 at 09:36:54PM -0600) *--

> Because the *attacker* doesn't know the diffrence between that node having it 
> before or not.  For all he knows, that node could have just cached it like 
> all the rest and the request he made only succseeded in spreading the data 
> that he wanted to get rid of.

Hm, sorry, I'm confused. Firstly, what is considered harmful here? That
an attacker knows I had a file before, or that I have it at all? 

Secondly, how could an attacker use a htl 1 request msg to try to get
rid of data? (in the case htl 1 messages weren't forwarded on by a
probabilistic chance)

--nico

--
nico galoppo   -   tremelo/leuven, belgium
               -   baalsebaan 163, 3120 tremelo
---------------------------------------------------------------
[bash]:~$ man woman                 nico at crossbar dot net
No manual entry for woman           debian linux :: vim powered


_______________________________________________
freenet-tech mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/tech

Reply via email to