NAT Traversal & Bootstrapping

Woow, that’s a lot of work you’ve put in it. Respect for that. But I keep saying:

yes, they can block the outgoing connection to these bootstraps. But they can’t man-in-the-middle them or send the clients to a fake-network. In the binaries, that little quite .exe-file on your computer, the public key from the Maidsafe-bootstraps are hardcoded in. So from bit 1, only the bootstraps will understand what’s going on. No person can get in the middle of that. No one. David pointed out here.

and further on:

So there goes you Fake-SAFE-network. It can’t be done on IP-level. So, to begin attacking, you need at least go to the second encryption level. That’s in XOR where you don’t know a person’s IP. Wel, you know the IP and XOR address of your relay-node. But not from your close nodes in XOR.