Brandon wrote:
> 
> > If we allow Freenet to be searched basd upon public keys of
> > authors of documents within subscpaes like you suggest, then
> > it may become possible to trace the originator of a request
> > based upon the list of public keys that he include as
> > search criteria. (everyone will have a different trust list)
> 
> That would not be the tracking of a request (nitpicking terminology
> here) but, rather, that you could be busted if They found your trust
> list. I don't think this is all that much of an issue since you'll
> probably have the information on your hard drive anyway, so then They can
> just bust you for having the information. Even if you filtered requests
> client-side (throw out non-matching ones) then you'd still have to keep
> the public keys on your hard drive. I don't see how transmitting the
> public key over the wire lessens anonymity at all.
> 

If they could eavesdrop on enough messages, though evil nodes, they might be
able to see that a greater-than-average proportion of messages with a particular
trust list are coming from a particular node. Your node. We would therefore
*have*
to have onion routing.

_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to