freenetwork at web.de wrote: > I'm sorry if this appeared rude, it really was not intended to be. I better > add that emoticon next time ;) > Sure. No problem!
> Then again, OFF chunks a) don't need to be encrypted as they are ""random > data"" If I can flood the net with bogus identical chunks with contents known to me (say binary zero), I had a good chance, that these would be used for XOR-encryption and get immediate access to cleartext. On the other hand, if this OFF-concept would be implemented on top of Freenets CHKs , I wouldn't be able to "flood" the net with identical chunks anyway There is possibly another problem: If a chunk is a bit more popular than others, because it got reused just by chance or because it is in a very popular file, it will more often be in caches and so more often be reused for new files than other chunks. So popular chunks get more and more popular and tend to be in mamny caches So, it might be a valid attack to try to XOR every chunk in a nodes store with the most popular chunks of the net and hope to get cleartext from it. > So if I have enough transistors, resistors, capacitors and soldering wire I'm > going to be framed for being able to build [evil thing, you name it here] > even IF I HAVE NO INSTRUCTIONS (no formula because of no metadata, no > decryption key) and NO CLUE HOW TO DO SO (no guide which blocks to combine > how; best fit is bruteforce permutation through all possible XOR > combinations) for that? We are not just thinking of constitutional states, where "guilt" has to be proven to some extend. If the Bad Hats know, there is this Paper "Bad Hat No 1 has a small dick" floating around, I don't want them to find "am BlHatk l1d sa dhocN as ia" on my desk, although there is no prove, that I know what to make out of it and that it might not be shuffled to a strange Klingon phrase at well. Bad Hats are bad and tend to say "guilty despite any reasonable doubt". Why not just XOR freenets 32kB SHKs? As a start, a new Key layout could look like XOR at hash1,hash2,key,flags . This should fetch CHK at hash1,0,flags and CHK at hash2,0,flags , combine them to produce the data and decrypt with key. So even if the Bad Hats know, that these two hash keys can be combined to the unwanted sentence, for some strange reason these two keys have become very popular, were often together in some caches at the same time and were often used together again for new datasets, including Bad Hats own propaganda. I dont known enough about other freenet keys yet. I guess, the manifest format had to be changed to make use of chunk combinations. Just ideas. btw: Sorry about the Subject line. I was going to quote the FAQ http://freenetproject.org/faq.html#idea as an excuse for me to post to this list without knowing anything, not to praise my idea as great. I just forgot about it during my exhausting writing. As you might have guessed, English is not my native language ;-) Donald -- Donald Buczek buczek at molgen.mpg.de Tel: +49 30 8413 1433