| 26 | | Cookbook at the High School that I went to. Here's the details of the |
| 27 | | origin of the convergence secret: `Convergence Secret Justification`_ |
| | 26 | Cookbook at the High School that I went to. This is called the |
| | 27 | "Confirm-The-File" attack. |
| | 28 | |
| | 29 | There is one more way that this can be used. Let's say that you know |
| | 30 | somebody stores their W-2 (a US tax document) on their Tahoe-LAFS grid. |
| | 31 | You can, with a little script, try various numbers for identity information |
| | 32 | and eventually end up with your full identity and salary. This is called |
| | 33 | the "Learn-The-Remaining-Information" attack. |
| | 34 | |
| | 35 | Here's the details of the origin of the convergence secret: |
| | 36 | `Convergence Secret Justification`_ |