require much less network and CPU but it could make it extremely unlikely
that any sort of corruption -- even malicious corruption intended to evade
detection -- would evade detection. This would be an instance of a
- cryptographic notion called "Proof of Retrievability".
+ cryptographic notion called "Proof of Retrievability". Note that to implement
+ this requires no change to the server or to the cryptographic data structure
+ -- with the current data structure and the current protocol it is up to the
+ client which blocks they choose to download, so this would be solely a change
+ in client behavior.
SECURITY
<h2>Install Python</h2>
- <p>Check if you already have an adequate version of Python installed by running <cite>python -V</cite>. Python v2.4 (v2.4.2 or greater), Python v2.5 or Python v2.6 will work. Python v3 does not work. If you don't have one of these versions of Python installed, then follow the instructions on <a href="http://python.org/download/">the Python download page</a> to download and install Python v2.6.</p>
+ <p>Check if you already have an adequate version of Python installed by running <cite>python -V</cite>. Python v2.4 (v2.4.2 or greater), Python v2.5 or Python v2.6 will work. Python v3 does not work. If you don't have one of these versions of Python installed, then follow the instructions on <a href="http://python.org/download/">the Python download page</a> to download and install Python v2.5.</p>
<p>(If installing on Windows, you now need to manually install the <cite>pywin32</cite> package -- see "More Details" below.)</p>
<h2>Get Tahoe-LAFS</h2>