If they're that stupid, let them. We'll just leave a few pointy sticky laying around and hopefully they'll pick one up and stab themselves to death. ;-)volkris wrote:The only problem is that others will see what you're writing and interpret the wrong way, thinking that open sourcing is inherently insecure.(...)
Search found 18 matches
- 2003-03-09 06:48
- Forum: Protocol Alley
- Topic: Version Authentication
- Replies: 14
- Views: 7133
- 2003-03-08 17:09
- Forum: Protocol Alley
- Topic: Version Authentication
- Replies: 14
- Views: 7133
OSS has a lot to do with it. If you have closed source you can use obscurity for this purpose. Although obscurity is never a substitute for security (or authenticity in this case) it's a hell of a lot easier to do. And yet it is very often that a closed source client is hacked before the open sourc...
- 2003-03-08 16:43
- Forum: Protocol Alley
- Topic: Adding file hashes to the protocol
- Replies: 97
- Views: 45678
I know people must hate me for this by now ;-), but do check out what the OCN people have done with Tree Hashes and such. (This is what Tiger Tree Hashes are based on.) http://open-content.net/specs/ . There's stuff for detecting partial files and downloading as well. Although that system is designe...
- 2003-03-08 16:35
- Forum: Protocol Alley
- Topic: BitTorrent
- Replies: 24
- Views: 14614
Although I dont know exactly what the swarmcasting is, I have seen a sketch of the BitTorrents functionality. And to be honest I cannot see that such function would be of any help in DC++. The reason is that there are not that many transfers that are getting the same files from the same user at the...
- 2003-03-01 16:41
- Forum: Protocol Alley
- Topic: Version Authentication
- Replies: 14
- Views: 7133
Version authentication. I really can't think of a way to do this in an OSS program. OSS has nothing to do with it, please don't spread the false impression that it does. OSS has a lot to do with it. If you have closed source you can use obscurity for this purpose. Although obscurity is never a subs...
- 2003-03-01 16:06
- Forum: Protocol Alley
- Topic: BitTorrent
- Replies: 24
- Views: 14614
- 2003-03-01 15:57
- Forum: Protocol Alley
- Topic: Adding file hashes to the protocol
- Replies: 97
- Views: 45678
And how do you propose to search for a hash if they are only generated when you search for them? If someone searches for a hash which filename you haven't seen a search for then the search will fail even if you have the file. So you /need/ to have the hashes precalculated. OTOH it would be clever to...
- 2003-02-24 17:08
- Forum: Protocol Alley
- Topic: Version Authentication
- Replies: 14
- Views: 7133
- 2003-02-24 12:24
- Forum: Protocol Alley
- Topic: Version Authentication
- Replies: 14
- Views: 7133
Version authentication. I really can't think of a way to do this in an OSS program. Neither can I recall reading about an established method to do it. Perhaps someone has a good idea though. It's always nice to have a brain puzzle like this to think about in any case. ;-) And just to start off, the ...
- 2003-01-24 18:35
- Forum: Protocol Alley
- Topic: Adding file hashes to the protocol
- Replies: 97
- Views: 45678
TigerTree are essentially a special case of Tree Hashes (which can use any hashing algorithm). So you could implement Tree Hashes and then just "throw away" some information and you've got a TT. (If you use the Tiger hashing algo.) BTW the Tree Hash Exchange protocol is described here: http://open-c...
- 2003-01-15 18:14
- Forum: Protocol Alley
- Topic: File upload/download
- Replies: 2
- Views: 2455
It's not really an FTP file transfer, but it is rather simple. You can find some documentation here http://sourceforge.net/docman/?group_id=36589 and there are other protocol descriptions available. (Unfortunately there were a lot of links in the old forum.) Basically there is some file stuff first ...
- 2003-01-14 15:04
- Forum: Feature Discussion (Archived)
- Topic: Download from multiple users
- Replies: 14
- Views: 11515
- 2003-01-14 15:02
- Forum: Feature Discussion (Archived)
- Topic: Remote User Agreement or something!
- Replies: 8
- Views: 4646
Besides, the guys working for "anti-pirat gruppen" in Sweden have legal authority to download the files. (Naturally the owner of the file always has legal rights to download it.) And to make matters even worse I doubt disclaimers like this have any legal authority. Even "shrink wrapped" licenses and...
- 2003-01-14 14:55
- Forum: Feature Discussion (Archived)
- Topic: Upload Speed Limiting
- Replies: 187
- Views: 90852
Regarding upload/download limits on high-speed networks. Here in Lund the student network is almost collapsing because of the high load. Last summer the network was connected to Sunet with Gb speeds, and this was the last drop. Some of the network links are now so satuated that you get transfer spee...
- 2003-01-13 16:26
- Forum: Feature Discussion (Archived)
- Topic: Download from multiple users
- Replies: 14
- Views: 11515
You can't use more than one slot from a single user. (Well besides in NMDC, but that's a bug.) So it would have to be multiple users. There was a lot of arguments about wether or not such a feature would be good for the DC network as well. Personally I think yes, but I guess the jury is still out on...
- 2003-01-11 16:29
- Forum: Protocol Alley
- Topic: Question to Arne about original design of DC
- Replies: 25
- Views: 14175
- 2003-01-09 13:44
- Forum: Protocol Alley
- Topic: Encryption?
- Replies: 78
- Views: 92763
Oh it's trivial. You just have to encrypt the IP address used in DC and then put some garbage in your IP headers. Unfortunately decryption is a bit hairier. Seriously though. Encryption would be a requirement if you wanted to do a "package bouncing network" which could then make you more or less ano...
- 2003-01-09 10:38
- Forum: Protocol Alley
- Topic: Encryption?
- Replies: 78
- Views: 92763
(Jay! I'm back. ;-) First off, I think encryption is a good idea. If for no other reason than a lot of people are paranoid and having an already established encryption scheme will alliviate the demand for 3rd party addons instead. (Creating even more interoperability difficulties.) You mention PK di...