Mr.Bad (Mon, Jun 18, 2001 at 01:10:51PM -0700): > >>>>> "IC" == Ian Clarke <ian at hawk.freenetproject.org> writes: > > >> How can you possibly know this, Ian? What makes you think this > >> is true at all? > > IC> Because people are reporting that their datastores tend to > IC> have one or two nodes to which almost all references are > IC> pointing to. > > See my explanation on chat. > > IC> Only one reference to each node is permitted in the datastore. > >> You have really got to be joking. WHAT? > > IC> This is even a viable attack, since a > IC> node could always set itself as the datasource on all > IC> messages, creating a positive feedback loop (more references > IC> in the datastore lead to still more references in the > IC> datastore). > > And the attack would be... what? That the node is providing your node > with valid data? That's an -attack-? Where does the actually-doing-damage > part come in?
as ubernode, create a routing-key -> complete key database from a keyindex, and you should be able to learn a lot about the undernode. since you know which keyspace the undernode is ``responsible for'', you should be able to recognize if the undernode is the initial requestor (routing-key different from ``keyspace'') > ~Mr. Bad -- moritz .------------------------------+------------------------+----------------------. | mailto:moritz at 1723.net | http://1723.net/ | ICQ: 110110488 | |------------------------------+------------------------+----------------------| | this mail is irevocably placed in the public domain and may be read, | | redistributed and erased freely, now and forever, amen. | ?------------------------------------------------------------------------------? _______________________________________________ Devl mailing list Devl at freenetproject.org http://lists.freenetproject.org/mailman/listinfo/devl
