Some thing I have always thought about was if you could probe or observe the network via a known chunk to yourself by trying to upload it or simply upload it into the network and see the results, replies, response time, and thus deduct if the network already posesses your chunk (read: your whole file, your precious data, your leaked stuff, your copyrighted whatever, your insert here).
does the network take precautions against such observation or timing attacks, response time probing or similar? will the network always take in the to-be uploaded data no matter what and consume it for nobody to be able to draw any conclusions from insertion behavior?
will the network be insert agnostic so to speak? thanks and cheers.