-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Friday 20 December 2002 04:25, Gordan Bobic wrote:
> Hi.
>
> This is mostly a paranoia issue, but here goes anyway.
>
> I haven't got a freenet node running at the moment, so my observations are
> only immediately based on a google search (sorry, didn't have the time
> recently to keep my node running). Is there a public Freenet node around
> that I could use for testing?
>
> Here is what I have I have noticed. The Freenet's supposedly secure
> SSK keys (URLs) are 31 bytes long in the format that appears to be Base64
> encoded. That is fine. However, I have also noticed that the last 4
> entries seem to be repeated with conspicuous regularity. On sites
> referring to Freenet 0.3 the URLs seem to end with QAgE and in 0.4 with
> PAgM. I presume this is a "feature". This reduces the key size down to 28
> bytes.
<>

Those endings are just identifiers showing what version of Freenet the key is 
for.  The keys themselves are really crytographic hashes (SHA1 IIRC).  
Nothing to worry about here.

- -- 
Timm Murray
GPG Key Fingerprint: 32E9 DBAF 8089 ECB7 696D  560B AA9B 9E29 C69C 7CB4
- ----------
I've finally learned what "upward compatible" means.  It means we get to 
keep all our old mistakes.
                --Dennie van Tassel
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj4DosIACgkQqpueKcacfLTNQwCfT6uBXPtmRXGZku78297DERk1
6o0An294EVL4LeVFB4E2sZQsbhcodsHs
=oy4H
-----END PGP SIGNATURE-----


_______________________________________________
Tech mailing list
[EMAIL PROTECTED]
http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/tech

Reply via email to