First of all thanks for your help to my understanding of the source these days,
now I am struggling to comprehend what is going to happen when a client was
launched(Here I mean the client node's HTTP server). I learnt how twistd works
then checked tahoe-client.tac. In my opinion, these lines:
>
I propose: don't do anything without both a threat model and a clear
picture of the trade-offs any defense feature introduces.
Example conflict of goals: efficiency in the form of range updates
(which I believe MDMF format implements?) versus confidentiality
(against what threat model?) in the fo