Quote:
Originally posted by JackSpratts
my feeling is that leech systems shouldn't be automated but should be under the exclusive control of the host
|
i think you are missing the point. as tankgirl pointed out, no system is hack-proof if it relies on information from untrusted peer. no matter if it's automated or not.
in your example, i'm sure both the username and file list would be altered to give out an impression of a "sharing god". provided there's enough motivation for hackers (ie enough users applying the non-automated control) to alter them that is.
- jaan