The only way to fight that is with a BitMessage address blacklist, which isn't feasible because in order to check if a message should be blacklisted, I have to attempt decryption using every known blacklisted public key. In both cases all you need to "read" the illegal content off my hard drive is a free and easily available piece of software. Second, I can just send encrypted broadcast messages on the network and publicize the heck out of my BitMessage address, so everyone who wants to subscribe will find it easy to do so. They could perhaps even release a customized BitMessage client that lets you read the messages easily. First, an attacker can do what I described above and find some way to transmit lots of unencrypted content. However, there are ways to undermine plausible deniability. However, then you have plausible deniability. Is this possible? Will a test for randomness work? What if the data was zipped, would that still - it's true that they could upload any message, even encrypted, and give the cops the key. In order to defend against such an attack, the receiving node has to be able to reject messages that have an unencrypted payload. Receiving nodes assume all messages are encrypted, and they try to decrypt every message with all of its private keys (or public keys of broadcast senders you want to subscribe to). That being said, an attacker could send a message to other nodes that had an unencrypted payload. However, all the content is supposed to be encrypted, and unless you have the private key because the message was addressed to you (or you want to try all possible combinations of all public keys to look for broadcast messages) then you can't actually read the content. One possible attack against me would be to upload illegal content to my node, and once someone knows it's there, to tip off the authorities, who would then search my computer and discover illegal content.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |