On Sun, Sep 03, 2006 at 12:18:49PM +0100, Dave Baker wrote:
> 
> I still don't see where the correlation between well-behaved nodes and 
> non-malicious ones came from.

It comes from detectable attacks. And of course not all attacks are
detectable, and a node may want to get a lot of peers before it attacks.
> 
> Dave
-- 
Matthew J Toseland - toad at amphibian.dyndns.org
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20060904/1c4f61c8/attachment.pgp>

Reply via email to