I called this sort of attack "boxing in", and we discussed how to get around it with Public Keys attached to the node addresses last week.
That said, it is still just "resistant". On Tue, 09 May 2000, Lawrence W. Leung wrote: > I keep hearing arguments about how the feds arrest you if this or that is > done to the protocol. But is freenet really fbi proof or just resistant? > > Here's my own dramatized version of an FBI attack: > User Ulysses is on your typical cable connection. He decides to start his > own node, hearing that it's more secure to access data through that node. > > Ulysses downloads highly illegal file X. FBI suspects Ulysses because he > talks too much and decides to prove that he downloaded illegal file X so > they have a passable reason to throw him in jail. > > They take over his cable link. Freenet connections are effectively > blocked. They create a virtual freenet node for ever node that he attempts > to connect to. It relays information from the real node, except disallows > transfers of file X. So Ulysses cant randomly pass on the query to any > other node. > > The FBI keeps requesting X from Ulysses (perhaps over a period of a week > or longer). Eventually Ulyesses offers X. The FBI can prove X is in > Ulysses's possession. > > Ulysses is thrown in jail > > Ok, now what part of this conspiracy is wrong? > -Larry > > PS. Or rather, if they want Ulysses bad enough they can tempest > him. Poor guy doesn't stand a chance. > > > _______________________________________________ > Freenet-dev mailing list > Freenet-dev at lists.sourceforge.net > http://lists.sourceforge.net/mailman/listinfo/freenet-dev -- Oskar Sandberg md98-osa at nada.kth.se #!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj $/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1 lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/) _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev
