On Thu, Mar 16, 2006 at 07:48:25PM +0000, Michael Rogers wrote: > > If all your packets take the same path to X, then even if the attacker > controls every node on the path, your anonymity set contains all the > nodes uphill from you. But if your packets travel to different starting > points before starting their journey to X, then your anonymity set only > contains the nodes that are uphill from you with respect to *all* the > starting points. As the number of starting points increases, the > anonymity set shrinks very quickly. (Exponentially?)
Who says the starting points need to downhill from you? They're random. This may all be immaterial anyway; if it turns out we can't help but expose the network topology, we'll probably do premix for 0.7. > > >Well sure but you just said the locations are exposed anyway! > > The locations of the people you're corresponding with, yes. But the > locations of your neighbours' neighbours could also be interesting, > especially if you can tell when they join and leave the network (as I > think you mentioned in another thread). > > Cheers, > Michael -- Matthew J Toseland - toad at amphibian.dyndns.org Freenet Project Official Codemonkey - http://freenetproject.org/ ICTHUS - Nothing is impossible. Our Boss says so. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: Digital signature URL: <https://emu.freenetproject.org/pipermail/tech/attachments/20060318/76a77b3b/attachment.pgp>
