Historias
Slashboxes
Comentarios
 
Este hilo ha sido archivado. No pueden publicarse nuevos comentarios.
Mostrar opciones Umbral:
Y recuerda: Los comentarios que siguen pertenecen a las personas que los han enviado. No somos responsables de los mismos.
  • Re:Freenet

    (Puntos:3, Informativo)
    por rrey (3007) el Martes, 17 Febrero de 2004, 13:06h (#266520)
    ( http://ramonrey.net/ | Última bitácora: Sábado, 15 Diciembre de 2007, 14:11h )

    El contenido del que tu haces "proxy/mirror" en Freenet esta cifrado usando criptografia fuerte y no sabes cual es el contenido del mismo. De hecho, sin tener la clave para cada contenido de Freenet, no puedes acceder a el, por lo que no se te puede acusar de absolutamente nada, de ahi su genialidad como protector de la libertad de expresion.

    [ Padre ]
  • Re:-1 Desinformativo

    (Puntos:1, Divertido)
    por pobrecito hablador el Martes, 17 Febrero de 2004, 17:51h (#266632)
    El desinformador que lo desinforme, buen desinformador será.
    [ Padre ]
  • Re:-1 Desinformativo

    (Puntos:3, Informativo)
    por YellowJacket (3749) el Martes, 17 Febrero de 2004, 19:13h (#266655)
    Mis más sinceras disculpas por la pifia cometida. Efectivamente cifra la información. Te anexo un pequeño fragmento del FAQ de FreeNet:

    Won't attack X break Freenet's anonymity?
    Short answer: Probably yes.
    Long answer: Freenet does not offer true anonymity in the way that the Mixmaster and cypherpunk remailers do. Most of the non-trivial attacks (advanced traffic analysis, compromising any given majority of the nodes, etc.) that these were designed to counter would probably be successful in identifying someone making requests on Freenet. On Freenet, whatever you do, your identity is still revealed to the first Freenet Node you talk to, and even if you limit yourself to talk only to trusted nodes (a feature that will be implemented in the future), they will have to talk to the rest of the network at some time or another. The anonymity that Freenet offers is really just obscurity in the fact that it is hard to prove that your node wasn't proxying the request for or insert of data on behalf of somebody else (who might also just have been proxying it).

    The problem is that the only way that you can offer true anonymity is if the client can directly control the routing of data, and thus encrypt it with a series of keys of the nodes it will pass through (a la Mixmaster). Freenet's dynamic routing cannot offer that, so to attain true anonymity you have to send the message through an external network of anonymous remailers first (a future SMTP->Freenet bridge would make this possible). There are also plans for doing mixmaster-style injection of requests over the "standard" protocol, however this probably won't be implemented before version 1.0, which is still some way off.


    En definitiva, recordando esto se me fue la perola.

    Disculpa a los lectores de /.

    --
    Avengers Assemble!!
    [ Padre ]
  • 1 respuesta por debajo de tu umbral de lectura actual.