Seen as Matthew has answered this for me recently, I feel obliged to save him the trouble of repeating himself. :-)
> when i do perform a search... how does my Query is protected against > someone that is eavesdropping my communication even before the first > hop? DSA for secure key exchange, then symetric encryption. Very much like SSH. > i mean.. how, and how well does public key technology in freenet > guarantees about the unreadability of query content? The content of the communication session between the nodes is encrypted. All that you can tell is that node X is talking to node Y. You don't know what it is asking for, and you don't even know if it is a request originating from that node, or whether it is passing on the request from another node. Regards. Gordan _______________________________________________ Tech mailing list [EMAIL PROTECTED] http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/tech
