Ludovic Courtès wrote:
> Hello!
>
> Loic Dachary <l...@dachary.org> writes:
>
>   
>> The context in which I am exploring this topic is a collaborative search
>> software ( http://seeks-project.info/ ).
>>     
>
> Heh, good to learn.  ;-)
>
> Indeed, I think there are application-specific security concerns, e.g.,
> search keyword poisoning: a malicious party could attempt to pollute the
> search results for given keyword.
>
> GNUnet’s anonymous file sharing encoding/protocol (ECRS) prevents users
> from replying random data to keyword searches [0].  I think it can’t
> directly prevent users from inserting arbitrary content under popular
> keywords, though, but the fact that content replication is partly
> demand-driven may mitigate it.
>
>   
It looks like compromise is in order, indeed.

The key question, it seems, is :

 * given the most frequent use cases of the collaborative search software
 * given the known security issues that threaten any DHT + those
specific to the application
 * given the existing counter measures (ECRS among others)
 => is it likely that users will be able to effectively use the software
or will they be disrupted
       by security problems at a frequency that will be discouraging for
most ?

Maybe it is a naïve way to approach the problem. I'm struggling to find
a way to understand this topic and your help is much appreciated :-)
> YaCy may also address some of the concerns you may have [1].
>   
I did not see anything related to resolving security issues in YaCy, but
it was my first exploration and I may have missed the relevant part. Did
you think of something specific ?

Cheers

<<attachment: loic.vcf>>

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to