On Sun, 25 Aug 2013 18:04:13 -0700 "Christian Huitema"
<huit...@huitema.net> wrote:
> Bottom line, anonymous DHT are fragile.

Though it appears that Tor uses them for its hidden service
directory. How does it do that robustly (or does it do it robustly)?
How do other users of DHTs handle attacks in practice (or is it just
that no one has tried attacking them enough?)

My back of the envelope says that there's little enough data needed
in the distributed data store I want that 1000x replication would not
be a serious problem. I presume that is not sufficient to make Sybil
attacks moot, given the size of modern botnets?

Perry E. Metzger                pe...@piermont.com
The cryptography mailing list

Reply via email to