On Thu, Mar 16, 2006 at 07:48:25PM +0000, Michael Rogers wrote:
> 
> If all your packets take the same path to X, then even if the attacker 
> controls every node on the path, your anonymity set contains all the 
> nodes uphill from you. But if your packets travel to different starting 
> points before starting their journey to X, then your anonymity set only 
> contains the nodes that are uphill from you with respect to *all* the 
> starting points. As the number of starting points increases, the 
> anonymity set shrinks very quickly. (Exponentially?)

Who says the starting points need to downhill from you? They're random.

This may all be immaterial anyway; if it turns out we can't help but
expose the network topology, we'll probably do premix for 0.7.
> 
> >Well sure but you just said the locations are exposed anyway!
> 
> The locations of the people you're corresponding with, yes. But the 
> locations of your neighbours' neighbours could also be interesting, 
> especially if you can tell when they join and leave the network (as I 
> think you mentioned in another thread).
> 
> Cheers,
> Michael
-- 
Matthew J Toseland - toad at amphibian.dyndns.org
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20060318/76a77b3b/attachment.pgp>

Reply via email to