1. 3
  1.  

  2. 1

    I’m finding it difficult to believe that this research was regarded by Brown University as ethical, or even legal. Scanning thousands of sites for “permissive defaults” and spamming them with encrypted blobs? Really?

    1. 1

      Is this entirely theoretical? Are there any implementations of this anywhere?

      1. 1

        To determine whether the Graffiti Network model is a viable and thus is a potential threat, we implemented a prototype Graffiti tracker and client as an extension to the BitTorrent protocol. We then stored a sample data set on a large number of open sites and measured the availability of our data for almost an entire year

        1. 1

          I guess what I was hoping for is… Github URL? :) But I suppose it’s unreasonable to expect that everything will be OSS always.