] Exploiting that information would be trivial. Only a bit ] of statistical data, of the sort that any government ] agency in the world could easily afford to obtain, will ] be needed. ] ] Here's what we need to know: how many chunks of a ] splitfile will appear on a node that only relays file ] requests after x amount of uptime. That's it. We already ] know that for nodes requesting a splitfile, the answer is ] 100% of the chunks in the amount of uptime needed to ] fetch them. By running several nodes and observing them, ] we can easily determine how long it will take to cache, ] by relaying alone, an entire file of x size. ] ] Since Freenet logs uptime, a forensic examiner can easily ] learn how long your node has been alive, even if there ] have been interruptions. So it is quite possible to ] estimate how many intact files, and of what size, your ] node ought to have cached without your participation. If ] the examiner finds many more files, or many larger files, ] than predicted, and they are illegal, you are in trouble. ] ] Using a tool called FUQID, which queues Freenet file ] requests, one could easily run a list of forbidden CHKs ] against a disk image. If the number/size of whole files ] containing naughty stuff is significantly higher than ] predicted by your node's uptime, you are in trouble. Attack against Freenet |