Quote:
Originally Posted by TankGirl
Not really. You don't want to mess with the hash numbers as correct hash numbers are needed to verify the integrity of the downloads. And it is pointless to try to hide any information in any particular clients as the security problem is in the protocol itself, and the bad guys do not depend on any publicly available clients.
To protect the first copy uploaders from being identified both BT and ed2k networks would need serious architectural changes, basically the introduction of some sort of anonymizing system or layer along the lines of MUTE and ANts.
- tg
|
alternately, first copy uploaders could just go find a free hotspot somewhere....