Brandon wrote: > > > If we allow Freenet to be searched basd upon public keys of > > authors of documents within subscpaes like you suggest, then > > it may become possible to trace the originator of a request > > based upon the list of public keys that he include as > > search criteria. (everyone will have a different trust list) > > That would not be the tracking of a request (nitpicking terminology > here) but, rather, that you could be busted if They found your trust > list. I don't think this is all that much of an issue since you'll > probably have the information on your hard drive anyway, so then They can > just bust you for having the information. Even if you filtered requests > client-side (throw out non-matching ones) then you'd still have to keep > the public keys on your hard drive. I don't see how transmitting the > public key over the wire lessens anonymity at all. >
If they could eavesdrop on enough messages, though evil nodes, they might be able to see that a greater-than-average proportion of messages with a particular trust list are coming from a particular node. Your node. We would therefore *have* to have onion routing. _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev
