You're right. From the wikipedia page on this: http://en.wikipedia.org/wiki/N... from the 'How it Works' section, they are planning centralized control of the data (ez wipe) and access restrictions to data built into the networking model.
"In many cases, substantial storage is already available, and could be used more efficiently if it could recognize particular content and only keep one copy of it. Since hierarchical structures can exist within the network graph, this mode of distribution could naturally scale content delivery to the size of the audience, and simultaneously reduce up-stream equipment to just the minimum needed to produce the content."
. . .
"In this model, the logical place to put commercial copy control and security is not in consumer equipment, but in the neighboring commercial network nodes. If the node agrees that the consumer has a distribution agreement, then restricted content can be delivered. Such delivery contracts require relatively few, cheap CPU cycles from devices already present near the edge of an ISP's net. If there are commercial restrictions, those may need to be included in the content names, as well."