Hello! Loic Dachary <l...@dachary.org> writes:
[...] > The key question, it seems, is : > > * given the most frequent use cases of the collaborative search software > * given the known security issues that threaten any DHT + those > specific to the application > * given the existing counter measures (ECRS among others) > => is it likely that users will be able to effectively use the software > or will they be disrupted > by security problems at a frequency that will be discouraging for > most ? Then you have to choose an adversary model. What do you expect wrongdoers to be able to do to make the system unusable? > I did not see anything related to resolving security issues in YaCy, but > it was my first exploration and I may have missed the relevant part. Did > you think of something specific ? No, but since it’s a distributed search engine, I thought there may be overlap. Thanks, Ludo’. _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers