On Sun, 25 Aug 2013 18:04:13 -0700 "Christian Huitema" <huit...@huitema.net> wrote: > Bottom line, anonymous DHT are fragile.
Though it appears that Tor uses them for its hidden service directory. How does it do that robustly (or does it do it robustly)? How do other users of DHTs handle attacks in practice (or is it just that no one has tried attacking them enough?) My back of the envelope says that there's little enough data needed in the distributed data store I want that 1000x replication would not be a serious problem. I presume that is not sufficient to make Sybil attacks moot, given the size of modern botnets? Perry -- Perry E. Metzger pe...@piermont.com _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography