1 First, we will look at several vulnerabilities or attacks found in general
2 We will then look at more specific attacks specially designed for P2P
After these two analysis, we will try to draw some first conclusions. We will
then proceed to our case study: Freenet.
3 We will thoroughly describe the Freenet structure.
4 Finally, we will try to find potential weaknesses in Freenet and ways to
After this we will draw our final conclusions and explore possible new directions.