Nico Galoppo: > Secondly, how could an attacker use a htl 1 request msg to try to get > rid of data? (in the case htl 1 messages weren't forwarded on by a > probabilistic chance)
Request a key from every node with htl=1. A few nodes will reply with your target data. Now simply make sure those few nodes never return that data to anyone else, either by destroying them outright or insert-flooding out your target key. _______________________________________________ freenet-tech mailing list [EMAIL PROTECTED] http://lists.freenetproject.org/mailman/listinfo/tech
