In a somewhat strange mood, I added a subdirectory in Freenet.contrib called attacks, which can/will/does contain source code to possible attacks on Freenet.
Then, just for fun, I wrote a Man-in-the-middle attack utility that demonstrates the fun, as well as acts as a very nice debugging aid. It works by accepting connections from Alice, negotiating crypto, then connecting to Bob, negotiating crypto, then ferrying data between them unaware, also logging to specified files. Scott -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20000523/97fc6eed/attachment.pgp>
