View Single Post
Old 25-09-02, 11:16 AM   #8
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,023
Default

Quote:
Originally posted by jaan
i think you are missing the point. as tankgirl pointed out, no system is hack-proof if it relies on information from untrusted peer. no matter if it's automated or not.

in your example, i'm sure both the username and file list would be altered to give out an impression of a "sharing god". provided there's enough motivation for hackers (ie enough users applying the non-automated control) to alter them that is.

- jaan
missing the point? lol, it is the point. kazaa's been out over a year and no one to my knowledge has corrupted the "find more from same user" info, up to now used as a manual leech control among other things, whereas this new automated scheme's been compromised in less than 24 hours.

- js.
JackSpratts is offline   Reply With Quote