Nico Galoppo:
> Secondly, how could an attacker use a htl 1 request msg to try to get
> rid of data? (in the case htl 1 messages weren't forwarded on by a
> probabilistic chance)

Request a key from every node with htl=1. A few nodes will reply
with your target data. Now simply make sure those few nodes never
return that data to anyone else, either by destroying them outright
or insert-flooding out your target key.

_______________________________________________
freenet-tech mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/tech

Reply via email to