klsc

Members
  • Posts

    4
  • Joined

  • Last visited

klsc's Achievements

New User

New User (1/3)

  1. yes, you are right. but GPUs can reach even more calculations. and more shared folders = more positive results purely theoretical ;-)
  2. for example, I think I can make a md5 hash from everything (also a key) an can calculate the key from the md5 hash. ifI know the hash algorythm I can recalculate the source "key". and if the algorithm is the same on every client, and the developer know it, he can recalculate the key from hash? http://md5decryption.com/ ... ah, sorry, its my mistake. I've messed it. the tracker only knows the hash and can't, if he want, decrypt the data behind the target ip because he can not calculate the "private key". only if someone bruteforce or have luck, he can get data from a person that he don't know.. It's very unlikely. now I understand. thank you
  3. How a client find with transmitting or asking the "private key" on the network, the corresponding public key on the tracker? there must be a function to find out the correct tracker hash passing to the "private key". and when I run a tracker, I know all available content hashes....?!
  4. hello together, I ask me if it is possible to get foreign content? is it possible to bruteforce valid keys to get the content from forein persons? or is there a "list" with valid keys in the web? how the client finds the right "server" with the suitable content for the secret key? why do not use a private and a public key or key and passphrase? I think it is not save if anyone can use a bruteforced or traced key without a pasasword or private key to decrypt the content. can someone enlighten me? thanks, ks