View Single Post
Old 25-09-02, 11:03 AM   #7
jaan
Registered User
 
Join Date: May 2002
Posts: 39
Default

Quote:
Originally posted by JackSpratts
my feeling is that leech systems shouldn't be automated but should be under the exclusive control of the host
i think you are missing the point. as tankgirl pointed out, no system is hack-proof if it relies on information from untrusted peer. no matter if it's automated or not.

in your example, i'm sure both the username and file list would be altered to give out an impression of a "sharing god". provided there's enough motivation for hackers (ie enough users applying the non-automated control) to alter them that is.

- jaan
jaan is offline   Reply With Quote