Hello!

Loic Dachary <l...@dachary.org> writes:

[...]

> The key question, it seems, is :
>
>  * given the most frequent use cases of the collaborative search software
>  * given the known security issues that threaten any DHT + those
> specific to the application
>  * given the existing counter measures (ECRS among others)
>  => is it likely that users will be able to effectively use the software
> or will they be disrupted
>        by security problems at a frequency that will be discouraging for
> most ?

Then you have to choose an adversary model.  What do you expect
wrongdoers to be able to do to make the system unusable?

> I did not see anything related to resolving security issues in YaCy, but
> it was my first exploration and I may have missed the relevant part. Did
> you think of something specific ?

No, but since it’s a distributed search engine, I thought there may be
overlap.

Thanks,
Ludo’.

_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to