[freenet-dev] Node specialization vs. attack on specific content

2003-05-16 Thread Edward J. Huff
On Fri, 2003-05-09 at 23:01, Toad wrote: > > Nice in theory, but in practice, how do you distribute the new > formulas? I've been thinking this week about a simpler problem: a network of nodes which provide the service of distributed storage and distribution of fixed length chunks of say 1

[freenet-dev] Node specialization vs. attack on specific content

2003-05-10 Thread Toad
On Sun, May 04, 2003 at 11:29:27PM -0400, Edward J. Huff wrote: > On Sat, 2003-05-03 at 19:35, Toad wrote: > > I am not sure that we could safely allow a get file closest to > > this key command... it might allow some kinds of probing/mapping that > > might lead to attacks we would want to avoid.

[freenet-dev] Node specialization vs. attack on specific content

2003-05-10 Thread Toad
On Sun, May 04, 2003 at 08:09:14AM -0400, Edward J. Huff wrote: > [If freenet-tech were "post only by members", I would gladly > move this discussion there. But I argue that it is relevant > here, because if my theory is correct, the routing layer of > Freenet only needs to concern itself with

[freenet-dev] Node specialization vs. attack on specific content

2003-05-10 Thread Toad
On Sun, May 04, 2003 at 08:34:55AM -0400, Edward J. Huff wrote: > On Sat, 2003-05-03 at 19:31, Hui Zhang wrote: > > > How do I trust the legitimacy of a given formula? > > > What prevents an > > > attacker from advertising tons of false formulas for > > > a file? > > > > This is a very convincing

[freenet-dev] Node specialization vs. attack on specific content

2003-05-10 Thread Toad
On Sat, May 03, 2003 at 03:29:17PM -0400, Edward J. Huff wrote: > BTW in my second post which you haven't replied to yet I didn't > make a clear distinction between files as CHK's of say 1 meg of > apparently random data vs files (documents) as content (not random). > > On Sat, 2003-05-03 at

[freenet-dev] Node specialization vs. attack on specific content

2003-05-10 Thread Toad
On Sat, May 03, 2003 at 01:58:01PM -0400, Edward J. Huff wrote: > On Sat, 2003-05-03 at 13:34, Edward J. Huff wrote: > > On Sat, 2003-05-03 at 12:56, Mark J Roberts wrote: > > > If you entangle your file with my illegal document, which is later > > > suppressed, you have nobody to blame but

[freenet-dev] Node specialization vs. attack on specific content

2003-05-10 Thread Toad
On Sat, May 03, 2003 at 01:34:09PM -0400, Edward J. Huff wrote: > On Sat, 2003-05-03 at 12:56, Mark J Roberts wrote: > > Edward J. Huff: > > > Also, this idea addresses the node specialization problem by > > > separating the routing problem from the defense against attack > > > on specific

[freenet-dev] Node specialization vs. attack on specific content

2003-05-05 Thread Edward J. Huff
On Sun, 2003-05-04 at 12:20, Ian Clarke wrote: > > Moglen points out exactly what my "legal" compression is > > intended to make obvious: the law must treat some numbers > > differently than others, and this is absurd. > > What if I send my friend a signed email saying "If you kill Oskar, I >

[freenet-dev] Node specialization vs. attack on specific content

2003-05-05 Thread Edward J. Huff
On Sat, 2003-05-03 at 19:35, Toad wrote: > I am not sure that we could safely allow a get file closest to > this key command... it might allow some kinds of probing/mapping that > might lead to attacks we would want to avoid. On the other hand, it is > an interesting idea. > Thanks for taking

[freenet-dev] Node specialization vs. attack on specific content

2003-05-04 Thread Edward J. Huff
On Sun, 2003-05-04 at 10:13, Mark J Roberts wrote: > Edward J. Huff: > > [If freenet-tech were "post only by members", I would gladly > > I hope I'm not coming across as hostile. I'm not trying to make you > go away or dismiss your ideas, and if I have come across as such it > is the fault of my

[freenet-dev] Node specialization vs. attack on specific content

2003-05-04 Thread Ian Clarke
> Moglen points out exactly what my "legal" compression is > intended to make obvious: the law must treat some numbers > differently than others, and this is absurd. What if I send my friend a signed email saying "If you kill Oskar, I will pay you $20,000", and my friend, knowing that I am

[freenet-dev] Node specialization vs. attack on specific content

2003-05-04 Thread Mark J Roberts
Edward J. Huff: > [If freenet-tech were "post only by members", I would gladly I hope I'm not coming across as hostile. I'm not trying to make you go away or dismiss your ideas, and if I have come across as such it is the fault of my own stupidity. > By linking many different documents to the

[freenet-dev] Node specialization vs. attack on specific content

2003-05-04 Thread Edward J. Huff
On Sat, 2003-05-03 at 19:31, Hui Zhang wrote: > > How do I trust the legitimacy of a given formula? > > What prevents an > > attacker from advertising tons of false formulas for > > a file? > > This is a very convincing argument. If multiple > versions are allowed for a single file, then it

[freenet-dev] Node specialization vs. attack on specific content

2003-05-04 Thread Edward J. Huff
[If freenet-tech were "post only by members", I would gladly move this discussion there. But I argue that it is relevant here, because if my theory is correct, the routing layer of Freenet only needs to concern itself with efficiently moving fixed length random files around. The current

[freenet-dev] Node specialization vs. attack on specific content

2003-05-04 Thread Toad
I am not sure that we could safely allow a get file closest to this key command... it might allow some kinds of probing/mapping that might lead to attacks we would want to avoid. On the other hand, it is an interesting idea. On Sat, May 03, 2003 at 12:11:10PM -0400, Edward J. Huff wrote: > I

[freenet-dev] Node specialization vs. attack on specific content

2003-05-03 Thread Mark J Roberts
Edward J. Huff: > Not at all. This is a data compression scheme which avoids > the problem of incompressibility. Any 1 meg file can be > represented as a CHK. (It fails only when there are hash > collisions.) I don't understand how this relates to compression. It doubles the size of all

[freenet-dev] Node specialization vs. attack on specific content

2003-05-03 Thread Hui Zhang
> How do I trust the legitimacy of a given formula? > What prevents an > attacker from advertising tons of false formulas for > a file? This is a very convincing argument. If multiple versions are allowed for a single file, then it brings the problem of inauthentic upload.

[freenet-dev] Node specialization vs. attack on specific content

2003-05-03 Thread Edward J. Huff
BTW in my second post which you haven't replied to yet I didn't make a clear distinction between files as CHK's of say 1 meg of apparently random data vs files (documents) as content (not random). On Sat, 2003-05-03 at 14:31, Mark J Roberts wrote: > > If the police don't know which of the set of

[freenet-dev] Node specialization vs. attack on specific content

2003-05-03 Thread Edward J. Huff
On Sat, 2003-05-03 at 13:34, Edward J. Huff wrote: > On Sat, 2003-05-03 at 12:56, Mark J Roberts wrote: > > If you entangle your file with my illegal document, which is later > > suppressed, you have nobody to blame but yourself when your file > > must be reinserted. It's sort of like announcing

[freenet-dev] Node specialization vs. attack on specific content

2003-05-03 Thread Edward J. Huff
On Sat, 2003-05-03 at 12:56, Mark J Roberts wrote: > Edward J. Huff: > > Also, this idea addresses the node specialization problem by > > separating the routing problem from the defense against attack > > on specific content. The defense problem is moved out of the > > freenet protocol to the

[freenet-dev] Node specialization vs. attack on specific content

2003-05-03 Thread Mark J Roberts
Edward J. Huff: > The idea is your illegal document would have been entangled > with other legal documents. Note of the CHK files would be > usable by themselves (or at least, those which are wouldn't > be used for entanglement). Every CHK would be entangled into > lots of different documents,

[freenet-dev] Node specialization vs. attack on specific content

2003-05-03 Thread Edward J. Huff
I suppose maybe this belongs on the TECH list, but that list seems to have nothing but spam, while this list doesn't. Also, this idea addresses the node specialization problem by separating the routing problem from the defense against attack on specific content. The defense problem is moved out

[freenet-dev] Node specialization vs. attack on specific content

2003-05-03 Thread Mark J Roberts
Edward J. Huff: > Also, this idea addresses the node specialization problem by > separating the routing problem from the defense against attack > on specific content. The defense problem is moved out of the > freenet protocol to the application, removing some constraints > and making it easier to