On Monday 18 August 2008 21:32, freenetwork at web.de wrote: > I personally like that concept and especially the texts below very much, > well done! They explain the current scope and a class where the user > might find himself targetted. > > Although I would like some more details what is done at which level; so, > which precautins become active, what is changed between levels, etc, > like it's done with the Physical Threat Level: tempfile encryption on > (high and off (low). So examples would be, when is FOAF active? what > informations are shared? what is active in other levels? > > Maybe just too detailed would be an advanced view which displays > affected configuration parameters, but I think the former, symptomatic > description, is needed.
The detail is likely to change as we add more details e.g. tunnels, random-encrypted splitfiles, etc. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20080818/2d2c95e3/attachment.pgp>