On Wednesday 23 January 2008 15:08, Michael Rogers wrote:
> On Jan 23 2008, Matthew Toseland wrote:
> > If we are assume: - We are only interested in local predecessor samples 
> > i.e. probability that originator == requestor. - We are only considering 
> > failed requests. - There are no timeouts. - A typical request has m hops 
> > where a positive sample may be taken and n hops where a negative sample 
> > may be taken.
> 
> Sorry, which scheme are you talking about here? If it's the current scheme 
> then the attacker doesn't need to consider the hop count, the nearest 
> location attack completely breaks anonymity. If it's the weighted coin 
> scheme then there aren't any negative samples, are there?

I am talking about a hypothetical, generalised scheme which doesn't have the 
nearestLoc: weighted coin on the one extreme, and adaptations of the current 
scheme without nearestLoc on the other.
> 
> Cheers,
> Michael
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20080123/e32d3946/attachment.pgp>

Reply via email to