Create an Account
username: password:
 
  MemeStreams Logo

Attack against Freenet

search

Acidus
Picture of Acidus
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Acidus's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
Attack against Freenet
Topic: Technology 3:35 pm EDT, May 24, 2005

] Exploiting that information would be trivial. Only a bit
] of statistical data, of the sort that any government
] agency in the world could easily afford to obtain, will
] be needed.
]
] Here's what we need to know: how many chunks of a
] splitfile will appear on a node that only relays file
] requests after x amount of uptime. That's it. We already
] know that for nodes requesting a splitfile, the answer is
] 100% of the chunks in the amount of uptime needed to
] fetch them. By running several nodes and observing them,
] we can easily determine how long it will take to cache,
] by relaying alone, an entire file of x size.
]
] Since Freenet logs uptime, a forensic examiner can easily
] learn how long your node has been alive, even if there
] have been interruptions. So it is quite possible to
] estimate how many intact files, and of what size, your
] node ought to have cached without your participation. If
] the examiner finds many more files, or many larger files,
] than predicted, and they are illegal, you are in trouble.
]
] Using a tool called FUQID, which queues Freenet file
] requests, one could easily run a list of forbidden CHKs
] against a disk image. If the number/size of whole files
] containing naughty stuff is significantly higher than
] predicted by your node's uptime, you are in trouble.

Attack against Freenet



 
 
Powered By Industrial Memetics
RSS2.0