On Sun, Dec 31, 2000 at 03:48:04PM -0800, Ian Clarke wrote:
> On Sun, Dec 31, 2000 at 03:03:07PM -0800, Aaron Voisine wrote:
> > It definately makes more sense from a deniablity standpoint to
> > use a dropthrough encryption algorithm on the KSK first.
> 
> We are smarter than we look ;-)
> 
> > As far as being a broadcast, I understand that's bad, but I
> > figured with caching and low hops to live, it would be no worse
> > than any other data request.
> 
> The primary means of ensuring scalability isn't really caching so-much as
> intelligent routing.
> 
> Here is how I think searching should happen:
> 
> We define a function that, given a list of key/data pairs (metadata
> describing the content) A, and given two other pairs, B and C, it can
> determine which of B and C is closer to A*.  There are an infinite number
> of ways that this could be achieved, but the closer it is to what a human
> might do, the better.  Someone did write some code which did this but I
> have no idea where they went.
> 
> Once you have done this, you can treat the metadata for a piece of
> information as a key, and can route requests towards that key.
> 
> The only remaining change is that, right now, a key will only be
> retrieved if you find it exactly, where as that is not going to happen in
> most cases with metadata searching.  We need a new "Find Closest" message
> which will return a list of the closest keys to the one being sought
> encountered by the search.  This would be returned to the user who would
> then select the one they want to try to retrieve.
> 
> * In actual fact it will be more complex than this, since this comparison
>   is likely to be a costly computation we will want to cache and
>   precompute whatever we can
> 
> Implementing searching will be great fun - if anyone wants to do
> interesting stuff with Freenet, I suggest that you attack this.  To begin
> with, you can start to think of good ways to do a fuzzy match of key/data
> pairs to another set of key/data pairs.  Of course, if you wanted to be
> super-smart, you could figure out a way to do a fuzzy match to an SQL
> statement (which rather than returning "yes" or "no", returned a measure
> of how close the match is).

The problem with searching is that it will probably be very difficult
to do it in a really secure manner.  Figuring out how to do fuzzy
searching is easy - figuring out how to do it in a way which won't
provide plenty of both in and out of band information about what is on
which nodes is a completely different story.  I essentially shot down
Aaron Voisine's keyword searching proposal (which even without this
wouldn't work) because it provides way too much information about what
is on which nodes.

-- 
Travis Bemann
Sendmail is still screwed up on my box.
My email address is really [EMAIL PROTECTED]

PGP signature

Reply via email to