On Mon, 15 Apr 2002, Mark J Roberts wrote:

> Kevin Atkinson:
> > Yes, but they will also be ranked by popularity of the complete key (with 
> > the signature) therefore bogus keys will be near the bottom of the list.
> 
> So I request my keys over and over until they're more popular.

I never said it will be perfect.  But in practice this will be hard to do.  
My network will have certain checks to keep a node from repetitively
requesting a key among other things.

> > Each block will be requested individually and then assembled into
> > the final file on the client size.
> 
> Isn't it likely that a few blocks would fail?

And if so it will simply search for them like it would for any other data 
key.  Not a big deal at all.

---
http://kevin.atkinson.dhs.org


_______________________________________________
freenet-tech mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/tech

Reply via email to