On Sun, Sep 03, 2006 at 12:18:49PM +0100, Dave Baker wrote: > > I still don't see where the correlation between well-behaved nodes and > non-malicious ones came from.
It comes from detectable attacks. And of course not all attacks are detectable, and a node may want to get a lot of peers before it attacks. > > Dave -- Matthew J Toseland - toad at amphibian.dyndns.org Freenet Project Official Codemonkey - http://freenetproject.org/ ICTHUS - Nothing is impossible. Our Boss says so. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: Digital signature URL: <https://emu.freenetproject.org/pipermail/tech/attachments/20060904/1c4f61c8/attachment.pgp>