-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Matthew Toseland wrote:
> If only the original requester slows down in response to relayed
> RejectedOverload's. Which is the case now.

Sneaky  :-)  But in order to exploit that information, wouldn't you have
to be able to tell that a series of requests came from the same sender?
In which case wouldn't you already be able to perform a statistical
attack to estimate how close you were to the sender?

Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEkHkMyua14OQlJ3sRAvizAKDM/vbkKchvbEH1qzYVC88jRsJn+ACdGKzp
PJrerY7G+TeuAdKxzpt3zbk=
=sus2
-----END PGP SIGNATURE-----

Reply via email to