On Mon, 15 Apr 2002, Mark J Roberts wrote: > Kevin Atkinson: > > Yes, but they will also be ranked by popularity of the complete key (with > > the signature) therefore bogus keys will be near the bottom of the list. > > So I request my keys over and over until they're more popular.
I never said it will be perfect. But in practice this will be hard to do. My network will have certain checks to keep a node from repetitively requesting a key among other things. > > Each block will be requested individually and then assembled into > > the final file on the client size. > > Isn't it likely that a few blocks would fail? And if so it will simply search for them like it would for any other data key. Not a big deal at all. --- http://kevin.atkinson.dhs.org _______________________________________________ freenet-tech mailing list [EMAIL PROTECTED] http://lists.freenetproject.org/mailman/listinfo/tech