On Monday 18 August 2008 21:32, freenetwork at web.de wrote:
> I personally like that concept and especially the texts below very much,
> well done! They explain the current scope and a class where the user
> might find himself targetted.
> 
> Although I would like some more details what is done at which level; so,
> which precautins become active, what is changed between levels, etc,
> like it's done with the Physical Threat Level: tempfile encryption on
> (high and off (low). So examples would be, when is FOAF active? what
> informations are shared? what is active in other levels?
> 
> Maybe just too detailed would be an advanced view which displays
> affected configuration parameters, but I think the former, symptomatic
> description, is needed.

The detail is likely to change as we add more details e.g. tunnels, 
random-encrypted splitfiles, etc.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20080818/2d2c95e3/attachment.pgp>

Reply via email to