On Mon, Apr 23, 2007 at 09:04:56PM +0100, Volodya wrote: > > Well, people do get pushed to extreme measures when protecting themselves > from the attack. > And 0,5 community seems to be bent on sabotaging the work done by the > developers so far. I > wouldn't support identifying any of the 0,5 posters in public, since some of > them can > actually get into trouble, but it would be nice if somebody can go on 0,5 and > do traffic > analysis on the Frost keys and then sending private message to people with > their ip address.
It's not something I can do, but it would be fun and useful to trace somebody on opennet/0.5. The question is how to do it - the least nasty way to do it would be for somebody (a prominent frost poster who contributes content) to volunteer... Then there's the question of whether anyone would believe us if we don't actually post his IP publicly... How to organise such an attempt to trace somebody, in an ethical way, as a means of investigating the security of 0.5 and/or 0.7 opennet? -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: Digital signature URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20070423/628ff1d9/attachment.pgp>
