How would that work? I don't tell anyone from outside this site that I post on KF, and I don't recommend that anyone does.
Schematically, you would tell someone who is already a registered user that you are the user "Kosher Dill" on Kiwi Farms, or alternatively just fill out a CAPTCHA.
Where's the source code? There's very little documentation out there so it's hard to say just how this system actually works. Has it actually stood up to the kind of attacks we're anticipating or is this just security by obscurity?
The part about solving CAPTCHAs is worth checking out either way, apparently they've figured out some way to do it.
Source of reference implementation and official website (on Freenet)
Source of reference implementation and official website (clearnet mirror)
jfms, a much nicer implementation (on Freenet)
The Unofficial Guide to FMS (on Freenet)
CAPTCHAs are just normal old-school text captchas. If one is cracked by a spambot, the identity issuing vulnerable CAPTCHAs will get their trust list negrated by others. If all extant CAPTCHA systems crack, then registration will just be blocked, until someone comes up with a system like "send me a PM on forum X and I'll trust you". Such a compromise won't affect already registered users, because they have positive trust from other users that doesn't come from CAPTCHAs.
DoS attacks are handled by it being a pull-based system: you have to request all messages, which means creating a billion junk messages won't do any harm if nobody cares to request them.
FMS was created as a response to the previous system (Frost) being absolutely riddled with spam/flooding. Frost still gets spam and FMS doesn't.
Freenet itself is pretty secure. You can tell because pedophiles use it to share CP. If it weren't secure, they would all be in prison.
What other attacks are you thinking of?
LADS already exists and it's called Usenet.
Usenet is good stuff.
My problem with Freenet is that if the internet is, as someone said, 'for porn'.. Freenet is 'for child porn'. As a user you have no control over what's being hosted by your node and stored on your hard drive.
That's true, but neither do you have any knowledge of it. Nobody, not even known pedophiles, has been sentenced over Freenet "storing" illegal materials.
Now, this is all very well if you're an above-board advocate of freedom of speech and you have absolutely no concerns about being targeted by police for your unorthodox views- say, for example, there's a grotesque tranny that you make fun of on KiwiFarms and you live in England- but if there's any chance at all that you're targeted for persecution it seems very unwise to use it, especially with the datastore on a volume that isn't encrypted if you're AFK.
The datastore is always encrypted. There is no way to tell what material you're storing, unless you already have its key. Nobody has been sentenced or charged with any crimes for running a Freenet node. It's like Tor in that regard, where it's completely legal to run an exit node, but illegal to deal in child pornography.
Should be fine, yes