klsc

Members
  • Posts

    4
  • Joined

  • Last visited

Posts posted by klsc

  1. for example,

    I think I can make a md5 hash from everything (also a key) an can calculate the key from the md5 hash. ifI know the hash algorythm I can recalculate the source "key". and if the algorithm is the same on every client, and the developer know it, he can recalculate the key from hash?

    http://md5decryption.com/

    ...

    ah, sorry, its my mistake. I've messed it.

     

    the tracker only knows the hash and can't, if he want, decrypt the data behind the target ip because he can not calculate the "private key".

    only if someone  bruteforce or have luck, he can get data from a person that he don't know.. It's very unlikely.

     

    now I understand. thank you

  2. Yes.

     

    Yes, but very very very very unlikely.

     

    No.

     

    That's essentially what it does: The BTSync tracker server has a list of hashes (the "public keys"). To connect to the server hosting the share and to decrypt the transmitted data you need the secret itself (the "private key").

    How a client find with transmitting or asking the "private key" on the network, the corresponding public key on the tracker?

     

    there must be a function to find out the correct tracker hash passing to the "private key".

     

    and when I run a tracker, I know all available content hashes....?!

  3. hello together,

    I ask me if it is possible to get foreign content?

     

    is it possible to bruteforce valid keys to get the content from forein persons?

     

    or

     

    is there a "list" with valid keys in the web? how the client finds the right "server" with the suitable content for the secret key?

     

    why do not use a private and a public key or key and passphrase? I think it is not save if anyone can use a bruteforced or traced key without a pasasword or private key to decrypt the content.

     

    can someone enlighten me?

     

    thanks, ks