On Fri, Jan 24, 2003 at 10:15:57PM +0100, Davide Venturelli wrote: > when i do perform a search... how does my Query is protected against > someone that is eavesdropping my communication even before the first > hop? > i mean.. how, and how well does public key technology in freenet > guarantees about the unreadability of query content? > Thanks in Advance, It's a fairly complex question. You should read the docs on freenetproject.org if you are interested. But in summary, freenet does a vastly better job at this than any other "P2P" application. Public key crypto is used for connections between nodes; plausible deniability comes from the fact that nodes serve requests for other nodes; documents are encrypted using a key that is encoded into the URL, and never seen by the node. > > Davide
-- Matthew Toseland [EMAIL PROTECTED][EMAIL PROTECTED] Full time freenet hacker. http://freenetproject.org/ Freenet Distribution Node (temporary) at ICTHUS.
msg01078/pgp00000.pgp
Description: PGP signature
