On Saturday 02 February 2008 16:24, Michael Rogers wrote: > Robert Hailey wrote: > > Unless [in a later implementation] DNFs (maybe weighed against HTL) > > become an indication of a separate network. Then it would do precisely that. > > DNFs would detect a "black hole" attacker - what about an attacker who > just wants to monitor a region of the key space or censor a few selected > keys? > > (Again, this criticism isn't specific to your proposal and I'm not > saying your proposal creates this problem.)
Swapping creates this problem. Or does it? Could you perhaps do some simulations of two networks of different sizes weakly linked and show whether they get independant location spaces, or whether swapping tries to put one of them within the global keyspace for the other? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20080204/a8cddec4/attachment.pgp>
