--* Timm Murray (Mon, Dec 17, 2001 at 09:36:54PM -0600) *--
> Because the *attacker* doesn't know the diffrence between that node having it
> before or not. For all he knows, that node could have just cached it like
> all the rest and the request he made only succseeded in spreading the data
> that he wanted to get rid of.
Hm, sorry, I'm confused. Firstly, what is considered harmful here? That
an attacker knows I had a file before, or that I have it at all?
Secondly, how could an attacker use a htl 1 request msg to try to get
rid of data? (in the case htl 1 messages weren't forwarded on by a
probabilistic chance)
--nico
--
nico galoppo - tremelo/leuven, belgium
- baalsebaan 163, 3120 tremelo
---------------------------------------------------------------
[bash]:~$ man woman nico at crossbar dot net
No manual entry for woman debian linux :: vim powered
_______________________________________________
freenet-tech mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/tech