"Scott G. Miller" wrote: > > > > > Weigh this against the alternative: those with a dynamic IP address > > must run a transient node, which does not offer plausible deniability > > for the operator. > How so? Running a transient node is just as secure as running a real > node, if not more so since you dont store any data. >
No-one has dealt with this problem yet: If you are running a transient node, and make a request, the upchain node knows that you made the request, because your node does not tunnel requests. Hence we lose all plausible deniability. _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev
