26 | | Cookbook at the High School that I went to. Here's the details of the |
27 | | origin of the convergence secret: `Convergence Secret Justification`_ |
| 26 | Cookbook at the High School that I went to. This is called the |
| 27 | "Confirm-The-File" attack. |
| 28 | |
| 29 | There is one more way that this can be used. Let's say that you know |
| 30 | somebody stores their W-2 (a US tax document) on their Tahoe-LAFS grid. |
| 31 | You can, with a little script, try various numbers for identity information |
| 32 | and eventually end up with your full identity and salary. This is called |
| 33 | the "Learn-The-Remaining-Information" attack. |
| 34 | |
| 35 | Here's the details of the origin of the convergence secret: |
| 36 | `Convergence Secret Justification`_ |