Break up the data into shares that have to be combined in order to
recover the original.  Distribute the shares in the system.
This way no node contains data that is useful/incriminating all
by itself.

On Tue, Apr 10, 2001 at 03:27:40AM -0500, Brandon wrote:
> 
> > Let's say that someone decides they want to build a key index of nekkid
> > eskimos.
> 
> You're question doesn't have anything to do with indices. You're question
> is just rather Freenet node operators are safe an attack where their node
> is confiscated and then the attacker does a brute force attack on all
> known keys to find illicit material on the node. (This is unrelated to key
> indices as there are other ways to find keys.)
> 
> And the answer is no. Not only that, but it's, as far as I can tell,

Reply via email to