On Tue, 16 Apr 2002, Nick Johnson wrote: > However, I think some of the other posters have made some very valid points, > especially the issue of key-kidnapping (taking over someones key with false > requests etc) - one problem with refusing multiple requests from one person > is that if you want anonymity, how do you tell if it is the same node over & > over? Also, from a usage point of view, Joe user is not going to like having > to select _which_ microsoft.com he wants to go to.
Well that is really the best I can do with out some central authority. Basically popularity of a key will depend on an estimate of how well the key is distributed around the network much like freenet so one user constantly selecting a node will do little to help its popularity. Also, keep in mind that anonymity is not one of my priorities. Finally, any key can be unlikely identified based on the signature/description pair. In fact this is how most non data keys will be identified. Finding a key with out a signature is simply a short cut. If it doesn't work out, it won't effect the rest of the network design. > Also, a question: How do you intend to implement such things as chat, email > and Streaming Media on a network that is designed to store data the way you > have described? I don't know yet. However, email can be done fairly easily by using a unique naming convention and then encrypting the data based on the intended recites public key. --- http://kevin.atkinson.dhs.org _______________________________________________ freenet-tech mailing list [EMAIL PROTECTED] http://lists.freenetproject.org/mailman/listinfo/tech