On Fri, Jan 24, 2003 at 10:15:57PM +0100, Davide Venturelli wrote:
> when i do perform a search... how does my Query is protected against
> someone that is eavesdropping my communication even before the first
> hop?
> i mean.. how, and how well does public key technology in freenet
> guarantees about the unreadability of query content?
> Thanks in Advance,
It's a fairly complex question. You should read the docs on
freenetproject.org if you are interested. But in summary, freenet does a
vastly better job at this than any other "P2P" application. Public key
crypto is used for connections between nodes; plausible deniability
comes from the fact that nodes serve requests for other nodes; documents
are encrypted using a key that is encoded into the URL, and never seen
by the node.
> 
> Davide

-- 
Matthew Toseland
[EMAIL PROTECTED][EMAIL PROTECTED]
Full time freenet hacker.
http://freenetproject.org/
Freenet Distribution Node (temporary) at
ICTHUS.

Attachment: msg01078/pgp00000.pgp
Description: PGP signature

Reply via email to