Seen as Matthew has answered this for me recently, I feel obliged to save him 
the trouble of repeating himself. :-)

> when i do perform a search... how does my Query is protected against
> someone that is eavesdropping my communication even before the first
> hop?

DSA for secure key exchange, then symetric encryption. Very much like SSH.

> i mean.. how, and how well does public key technology in freenet
> guarantees about the unreadability of query content?

The content of the communication session between the nodes is encrypted. All 
that you can tell is that node X is talking to node Y. You don't know what it 
is asking for, and you don't even know if it is a request originating from 
that node, or whether it is passing on the request from another node.

Regards.

Gordan

_______________________________________________
Tech mailing list
[EMAIL PROTECTED]
http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/tech

Reply via email to