Things not documented very well, yet, except as source code:
Disk file format of cache, store, etc.
Wire data format of peers communicating with each other, assuming knowledge of relevant cryptographic keys.
The lack of documentation is probably due to laziness (lack of resources), but possibly security by obscurity. The above two might make life easier for attackers.
No comments :
Post a Comment