On Fri, Dec 12, 2008 at 8:29 AM, Donald Buczek <buczek at molgen.mpg.de> wrote: > I'm not really into freenet yet, anyway I'd like to ask your comments on > this idea of mine: > > If I understand things correctly: > > Currently, if you can read the data stored on a node, you can tell, > whether is contains data you know the hash of. So node owners may get in > trouble, because they can be proven to posses certain data. The > possession itself might be illegal or lead to oppression, even if the > owner can not really be proven to have knowledge of the data or to have > requested it. > > Whatever, it would be much better, if a stolen data store would not > reveal its content. > > My idea how this could possibly done is this: > > Whenever some new data has to be inserted into the network, first > another chunk already in the network (in the nodes cache) is randomly > chosen and the new data is XORed with the old chunk producing a new > chunk. This new one is stored in the network. The information published > to retrieve the data is a pair of hashes to the old and the new chunk. A > client needs to retrieve both chunks to rebuild the data. (so requiring > up to doubled time and bandwidth, but not doubles storage)
This is exactly how OFF System[1] / Monlith[2] works. I don't think this would help at all. When the law say possession without knowledge can held guilty, there is no reason why this can be legal. Yale law school's LawMeme[3] have some discussion on this. You may found Schneier's article[4] interesting too. [1] http://offsystem.sourceforge.net/ [2] http://monolith.sourceforge.net/ [3] Archived at http://web.archive.org/web/20040812103610/http://research.yale.edu/lawmeme/modules.php?name=News&file=article&sid=1487 [4] http://www.schneier.com/blog/archives/2006/03/monolith.html > Whats is the point? The Point is, that possession of a chunk in the > datastore is not related to just the single file, the bad guys might > know about, but it might be related to many other data as well, the bad > guys don't know about or don't have problems with. > > You see: CHUNK1,CHUNK2 might combine to a problematic piece of data. > But CHUNK1 and CHUNK3 combine to some other data. So do CHUNK2 and > CHUNK4. So, possession of CHUNK1 and CHUNK2 does not prove, that the > problematic data has been produced or that the owner knows anything > about the fact, that they could be combined. CHUNK1 and CHUNK2 might > have been stored to serve some other data, even if other related chunks > can no longer be found in the cache, because they were displaced. All > chunks are just random data, they can be XORed to generate just > anything. The "poison", the difference between good or bad, is only in > the references, not in the data itself. > > I think, when existing chunks are chosen as partners for new data from > the inserting nodes cache, chunks will cluster together in different > contexts. If two chunks are "near" to each other, because they were > needed together to build one set of data, they will likely be used > together again to build new sets of data. So later its quite likely to > have CHUNK1 and CHUNK2 together in the cache for multiple sets of data. > > Is this understandable at all? What do you think? > > Sincerely > D. Buczek > > -- > Donald Buczek > buczek at molgen.mpg.de > Tel: +49 30 8413 1433 > > _______________________________________________ > Tech mailing list > Tech at freenetproject.org > http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech >