Quote:
Originally posted by jaan
i think you are missing the point. as tankgirl pointed out, no system is hack-proof if it relies on information from untrusted peer. no matter if it's automated or not.
in your example, i'm sure both the username and file list would be altered to give out an impression of a "sharing god". provided there's enough motivation for hackers (ie enough users applying the non-automated control) to alter them that is.
- jaan
|
missing the point? lol,
it is the point. kazaa's been out over a year and no one to my knowledge has corrupted the "find more from same user" info, up to now used as a manual leech control among other things, whereas this new automated scheme's been compromised in less than 24 hours.
- js.