freenetwork at web.de wrote:
> I'm sorry if this appeared rude, it really was not intended to be. I better 
> add that emoticon next time ;)
>   
Sure. No problem!

> Then again, OFF chunks a) don't need to be encrypted as they are ""random 
> data"" 

If I can flood the net with bogus identical chunks with contents known 
to me (say binary zero), I had a good chance, that these would be used 
for XOR-encryption and get immediate access to cleartext. On the other 
hand, if this OFF-concept would be implemented on top of Freenets CHKs , 
I wouldn't be able to "flood" the net with identical chunks anyway

There is possibly another problem:

If a chunk is a bit more popular than others, because it got reused just 
by chance or because it is in a very popular file, it will more often be 
in caches and so more often be reused for new files than other chunks. 
So popular chunks get more and more popular and tend to be in mamny 
caches So, it might be a valid attack to try to XOR every chunk in a 
nodes store with the most popular chunks of  the net and hope to get 
cleartext from it.

> So if I have enough transistors, resistors, capacitors and soldering wire I'm 
> going to be framed for being able to build [evil thing, you name it here] 
> even IF I HAVE NO INSTRUCTIONS (no formula because of no metadata, no 
> decryption key) and NO CLUE HOW TO DO SO (no guide which blocks to combine 
> how; best fit is bruteforce permutation through all possible XOR 
> combinations) for that?

We are not just thinking of constitutional states, where "guilt" has to 
be proven to some extend. If the Bad Hats know, there is this Paper "Bad 
Hat No 1 has a small dick" floating around, I don't want them to find 
"am BlHatk l1d sa dhocN as  ia" on my desk, although there is no prove, 
that I know what to make out of it and that it might not be shuffled to 
a strange Klingon phrase at well. Bad Hats are bad and tend to say 
"guilty despite any reasonable doubt".

Why not just XOR freenets 32kB SHKs?

As a start, a new Key layout could look like XOR at hash1,hash2,key,flags  
. This should fetch CHK at hash1,0,flags and CHK at hash2,0,flags , combine 
them to produce the data and decrypt with key. So even if the Bad Hats 
know, that these two hash keys can be combined to the unwanted sentence, 
for some strange reason these two keys have become very popular, were 
often together in some caches at the same time and were often used 
together again for new datasets, including Bad Hats own propaganda.

I dont known enough about other freenet keys yet. I guess, the manifest 
format had to be changed to make use of chunk combinations.

Just ideas.

btw: Sorry about the Subject line. I was going to quote the FAQ 
http://freenetproject.org/faq.html#idea as an excuse for me to post to 
this list without knowing anything, not to praise my idea as great. I 
just forgot about it during my exhausting writing. As you might have 
guessed, English is not my native language ;-)

Donald

-- 
Donald Buczek
buczek at molgen.mpg.de
Tel: +49 30 8413 1433


Reply via email to