On Tue, 16 Apr 2002, Nick Johnson wrote:

> However, I think some of the other posters have made some very valid points,
> especially the issue of key-kidnapping (taking over someones key with false
> requests etc) - one problem with refusing multiple requests from one person
> is that if you want anonymity, how do you tell if it is the same node over &
> over? Also, from a usage point of view, Joe user is not going to like having
> to select _which_ microsoft.com he wants to go to.

Well that is really the best I can do with out some central authority.  
Basically popularity of a key will depend on an estimate of how well the 
key is distributed around the network much like freenet so one user 
constantly selecting a node will do little to help its popularity.  Also, 
keep in mind that anonymity is not one of my priorities.  Finally, any key 
can be unlikely identified based on the signature/description pair.  In fact 
this is how most non data keys will be identified.  Finding a key with out 
a signature is simply a short cut.  If it doesn't work out, it won't effect 
the rest of the network design.

> Also, a question: How do you intend to implement such things as chat, email
> and Streaming Media on a network that is designed to store data the way you
> have described?

I don't know yet.  However, email can be done fairly easily by using a 
unique naming convention and then encrypting the data based on the intended 
recites public key.

--- 
http://kevin.atkinson.dhs.org


_______________________________________________
freenet-tech mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/tech

Reply via email to