Spike Gronim: > Verifying the existence of the data in the network doesn't allow you > to find it and destroy it, does it? Don't the anonymity properties of the > network allow you to answer the question "Does this exist?" without being > able to determine where it exists?
Any function that can be used to learn about specific data without replicating it is dangerous. Ideally an attacker is unable to gather any information about a key without causing it to be replicated. Currently this is not the case: for instance, requesting a key with htl=1 from every node will reveal who has it (and then you can flood those nodes until the file you hate is expunged). (And these attacks are undetectable since obviously nodes can't share connection logs!) We shouldn't be gratuitously adding features like this in any case; if anything, we should be modifying the protocol to make this sort of thing harder, even if that means losing functionality... _______________________________________________ freenet-tech mailing list [EMAIL PROTECTED] http://lists.freenetproject.org/mailman/listinfo/tech