Spike Gronim: > The boolean ping functionality would be equivalent to requesting a file > that was just 1 bit in length. And this wouldn't be a passive probe, as the > attacker would have to initiate a request. Such an attacker could just ask > for the file and then break off the transfer to have the same effect, coud he > not?
The nodes in the chain will cache the data anyway. (Which, by the way, makes flooding attacks _much_ easier...) _______________________________________________ freenet-tech mailing list [EMAIL PROTECTED] http://lists.freenetproject.org/mailman/listinfo/tech