-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The only problem I see is that if an adversary can somehow cause the nodes
along a link to fill up (maybe by requesting a whole lot of different
keys), he can be more and more certain that the source of an address is in
fact the original source.

> 
> Thus, for the most part, nodes behave like they currently do, but when
> they are near empty, they are much more aggressive about changing the
> DataSource.
> 
> Does this sound reasonable?

        Scott

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5Bd8rpXyM95IyRhURAhq0AKCW4LAna0OVdI393Ryi27k1lOF28ACgh1j3
2TaWDUkJgl2aXP6b0a6wXNc=
=gGsW
-----END PGP SIGNATURE-----


_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to