>>>>> "B" == Brandon  <[EMAIL PROTECTED]> writes:

    B> There are two types of attacks, those in which they seize the
    B> IP list of the detected node, and those in which they do
    B> not. MediaEnforcer's attack is of the first type. Nothing
    B> protects against the second type, so I'm discussing the first
    B> type.

B,

I think you got this backward, didn't you? I don't believe the
MediaEnforcer attack entails seizing the node machine (and also the
trusted node list).

    B> In the first type of attack, the node list is not
    B> seized. Therefore creating clusters reduces liability because
    B> less nodes are detectable via port scanning or running an evil
    B> node.

OK, this sounds right now. B-)

~Mr. Bad

-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 /\____/\   Mr. Bad <[EMAIL PROTECTED]>
 \      /   Pigdog Journal | http://pigdog.org/ | *Stay*Real*Bad*
 |  (X \x)   
 (    ((**) "If it's not bad, don't do it.
  \  <vvv>   If it's not crazy, don't say it." - Ben Franklin
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

_______________________________________________
Freenet-dev mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to