> From Mr.Bad <[EMAIL PROTECTED]>
>    IC> Do you think that it at-least partially addresses the "Media
>    IC> Enforcer" problem?
>
>I think it does, partially.
>
>~Mr. Bad

The only shortcoming (with regards to the "media enforcer" pseudo-attack) with 
"shadow nodes" is that it the 'shield' node is still exposed, correct?  The 
'shadowed' node's address is no longer distributed, and it no longer responds 
to unsolicited contact, right?

I guess the only other issue is whether people worried about being punished 
for using a node might not be better off with a transient node?  That would 
not contribute to the network, but Oskar apparently thinks that a shielded 
node would not contribute to the network, either.

Would it hurt the network to allow transient nodes to refuse incoming 
connections from non-localhost addresses?  If I understand the network 
correctly, this shouldn't be happening, anyway, so it shouldn't be a problem, 
right?

Would a shielded node's operator manually select a shield node?  How would he 
find one?  Would shield nodes allow anyone to "hide behind" them, or only 
selected other nodes, or what?  Would a node 'advertise' that it was willing 
to act as a shield node?

--
Benjamin Coates


_______________________________________________
Freenet-dev mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to