>>>>> "B" == Brandon <[EMAIL PROTECTED]> writes:
B> There are two types of attacks, those in which they seize the
B> IP list of the detected node, and those in which they do
B> not. MediaEnforcer's attack is of the first type. Nothing
B> protects against the second type, so I'm discussing the first
B> type.
B,
I think you got this backward, didn't you? I don't believe the
MediaEnforcer attack entails seizing the node machine (and also the
trusted node list).
B> In the first type of attack, the node list is not
B> seized. Therefore creating clusters reduces liability because
B> less nodes are detectable via port scanning or running an evil
B> node.
OK, this sounds right now. B-)
~Mr. Bad
--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/\____/\ Mr. Bad <[EMAIL PROTECTED]>
\ / Pigdog Journal | http://pigdog.org/ | *Stay*Real*Bad*
| (X \x)
( ((**) "If it's not bad, don't do it.
\ <vvv> If it's not crazy, don't say it." - Ben Franklin
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
_______________________________________________
Freenet-dev mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-dev