Okay, I don't get this. The only information available[1] in a freenet conversation is timing and size information. You'd have to be pretty good to fingerprint a freenet conversation with that...
If you want improved security, we can add padding systems to thwart the timing- and size-based detection. Putting SSH or SSL on things will NOT help matters. [1]Freenet protocol as 3rd party sees it: C->S <16 bytes of random data> S->C <16 bytes of random data> C->S <130 bytes of encrypted data> S->C <130 bytes of encrypted data> The rest is freenet messages + data (encrypted, of course). -- Taral <taral at taral.net> Please use PGP/GPG to send me mail. "Never ascribe to malice what can as easily be put down to stupidity." -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 240 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20010222/12789d17/attachment.pgp>
