gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] manuscripts/pointers article.rst


From: Benja Fallenstein
Subject: [Gzz-commits] manuscripts/pointers article.rst
Date: Mon, 10 Nov 2003 07:28:02 -0500

CVSROOT:        /cvsroot/gzz
Module name:    manuscripts
Branch:         
Changes by:     Benja Fallenstein <address@hidden>      03/11/10 07:28:02

Modified files:
        pointers       : article.rst 

Log message:
        twid concl, discuss anonymity concerns there

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/manuscripts/pointers/article.rst.diff?tr1=1.218&tr2=1.219&r1=text&r2=text

Patches:
Index: manuscripts/pointers/article.rst
diff -u manuscripts/pointers/article.rst:1.218 
manuscripts/pointers/article.rst:1.219
--- manuscripts/pointers/article.rst:1.218      Mon Nov 10 07:14:32 2003
+++ manuscripts/pointers/article.rst    Mon Nov 10 07:28:02 2003
@@ -652,22 +652,28 @@
 
 We have also presented the Storm data model, a simple
 model for representing data published on the P2P Web.
-The Storm model and allows powerful abstractions to be built on top of it
-(such as pointer records), and
-is easy to implement in a variety
+Storm has a simple plug-in architecture for indexing files
+by content. This allows powerful abstractions to be built on top of it
+(such as pointer records). 
+
+The model is easy to implement in a variety
 of ways on current systems, ranging
 from filesharing systems to global persistent data stores
 like as OceanStore to
 simply burning blocks on a CD and using SneakerNet
 for file transfers.
 
-An adversary may try to attack our system by trying
-to publish such a large amount of information
-that it overloads the P2P network used. This
-a problem shared with other P2P applications.
+.. Shared 1:1 with other P2P systems-- not that important
+   to discuss:
 
-An adversary may also use an information hiding attack,
-withholding new versions of documents to clients,
+   An adversary may try to attack our system by trying
+   to publish such a large amount of information
+   that it overloads the P2P network used. This
+   a problem shared with other P2P applications.
+
+An adversary may attempt to use an information hiding attack
+against our system,
+withholding new versions of documents from clients,
 making them believe that old versions are still current.
 It could be argued that this is more of a problem
 than an information-hiding attack in a filesharing system,
@@ -676,6 +682,12 @@
 is less visible. Thus, if possible, the underlying P2P network
 used should try to protect against information hiding attacks.
 
+Also, there may be privacy concerns with exposing one's cache
+on the network, as well as retrieving files from peers
+(because they can then see what one is trying to download).
+One way to counter this problem is to use an anonymizing
+P2P overlay.
+
 While our system helps to keep documents alive after
 the original publisher has lost interest in them, it
 does not protect against a publisher that wants to make
@@ -696,7 +708,7 @@
 
 We would like to thank Toni Alatalo, |Hermanni|, 
 Antti-Juhani Kaijanaho (who also proposed the name Storm),
-Matti Katila, and Janne Kujala for comments and discussions.
+Matti Katila, Janne Kujala and Sarah Stehlig for comments and discussions.
 
 .. XXX who else
 




reply via email to

[Prev in Thread] Current Thread [Next in Thread]