"Scott G. Miller" wrote:
> 
> >
> > Weigh this against the alternative:  those with a dynamic IP address
> > must run a transient node, which does not offer plausible deniability
> > for the operator.
> How so?  Running a transient node is just as secure as running a real
> node, if not more so since you dont store any data.
> 

No-one has dealt with this problem yet:

If you are running a transient node, and make a request, the upchain node knows 
that you
made the request, because your node does not tunnel requests. Hence we lose all
plausible deniability.

_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to