On Saturday 02 February 2008 16:24, Michael Rogers wrote:
> Robert Hailey wrote:
> > Unless [in a later implementation] DNFs (maybe weighed against HTL) 
> > become an indication of a separate network. Then it would do precisely 
that.
> 
> DNFs would detect a "black hole" attacker - what about an attacker who 
> just wants to monitor a region of the key space or censor a few selected 
> keys?
> 
> (Again, this criticism isn't specific to your proposal and I'm not 
> saying your proposal creates this problem.)

Swapping creates this problem. Or does it? Could you perhaps do some 
simulations of two networks of different sizes weakly linked and show whether 
they get independant location spaces, or whether swapping tries to put one of 
them within the global keyspace for the other?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20080204/a8cddec4/attachment.pgp>

Reply via email to