-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Matthew Toseland wrote: > If only the original requester slows down in response to relayed > RejectedOverload's. Which is the case now.
Sneaky :-) But in order to exploit that information, wouldn't you have to be able to tell that a series of requests came from the same sender? In which case wouldn't you already be able to perform a statistical attack to estimate how close you were to the sender? Cheers, Michael -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEkHkMyua14OQlJ3sRAvizAKDM/vbkKchvbEH1qzYVC88jRsJn+ACdGKzp PJrerY7G+TeuAdKxzpt3zbk= =sus2 -----END PGP SIGNATURE-----
