A successful attack on Freenet

What was mentioned as more likely (since you can’t decide that you want to hold a particular chunk) was to be the node that passes the chunk to the actual downloader, because you know his IP address. I can’t find that thread, but here’s a similar (thankfully we have 5 topics on each subject).

What wasn’t sufficiently emphasized is that for public shares, because they’re public, one can know each chunk’s hash.

In case Tor relay nodes are Web servers that act as HTTP proxy to the SAFE network, they’d have to break the both and ID the relay node plus the Tor user. It’d still be possible (to use this approach to ID users of public shares) but harder.

I don’t see what that has to do with DHT. The Last-1 node transfers stuff to teh Last node. There’s an IP connection between the two.

Well it wouldn’t be a hack if they deployed 5000 cheap VPS in a 1000 node network and just waited to see the right chunk passed to the ultimate destination.
That’s how it sounds like. We’ll see if they were stoopid enough to exactly explain what they did.

And how do you connect to known nodes, when you start with a set of MaidSafe seeed nodes which government agencies can spoof? I don’t think this can be so easily dismissed. They somehow did find those guys.

They just need to own one “Last-1” node that passed 1 chunk of 4700 you download in a full length public DVD file, so if you’re spraying your requests all over the network, it seems you’re guaranteed to get one requests routed through a LE system. Maybe I’m wrong, but can someone explain why?

Reddit: so how’s that different from what I said? (On Freenet, you need to add only trusted nodes, so they probably gained trust of some users and then served as a routing node (aka The Last - 1) for them; on SAFE that’d work differently).