On Wed, 2003-10-01 at 11:43, Fred Van Andel wrote: > P2P in general: > The content of the network needs to be tightly controlled. We are > dealing with source code here and the consequences of someone being > able to inject malicious code or malicious files into the network > would be unthinkable. Therefore ALL files on the network MUST be > vetted by a central server, and ONLY files allowed by the central > server would be allowed on the network. All files transfered over > the network MUST be checked to make sure that they match the > checksums of the authorized files. Not sure I agree with you here. On the contrary, you should have distributed files, vetted across the network, and used to ensure validity of the ones that may potentially have malicious files/codes.
Which is why we have mirrors today. :) My 2 cents. Ciao ST Lim -- [EMAIL PROTECTED] mailing list