On Sat, 2003-01-25 at 16:41, Davide Venturelli wrote:
> On Fri, 2003-01-24 at 22:49, Gordan Bobic wrote:
> 
> > The content of the communication session between the nodes is encrypted. All 
> > that you can tell is that node X is talking to node Y. You don't know what it 
> > is asking for, 
> 
> if you don't know, how can you satisfy the query if it comes that you're
> the node with the content requested?
> if you're looking for /text/cooking/all-about-chicken do the nodes that
> forwards your request know what the query is about?

The request is done via a cryptographic hash.  Nodes keep a list of the
hashes they have in their stores.  A strong crypto hash, such as SHA-1
(which is what Freenet currently uses), has no known effcient way of
recovering the data that was hashed.

It is possible that future research may find an efficent way of
recovering the data (actually, it would probably be one of many
different datasets, but a human should be able to pick out the "true"
data easily enough).  However, if we spent all our time worrying about
if the algorithms we use might, someday, perhaps, be shown to, in
theory, to have a weakness, we wouldn't get anything done.  So Freenet
goes ahead and uses what we know right now.

-- 


-------
Timm Murray

GPG Key: E4E143C6
Fingerprint: 591D DD8C 078C 7D45 ECE6  7B04 B62A 02C0 E4E1 43C6


-----BEGIN GEEK CODE BLOCK-----
Version: 3.1
GCS d- s+: a-- C++(++++) UL++>++++ P+++>+++++$ L++>+++++$ !E W--@ N++@
!o 
!K w--- O@ M !V !PS !PE Y+(++) PGP+++ t@ 5+++ X@ R tv b++(++++) DI++@
D+(++) 
G e* h* r->r+++ y? 
------END GEEK CODE BLOCK------

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to