On Mon, Dec 7, 2015 at 11:09 PM, Jonathan Wilkes <[email protected]> wrote:
> Say a well-funded attacker takes the Carnegie Mellon deanonymization attack 
> and introduces Sybil slowly over several months.

The graph would look like this...
https://metrics.torproject.org/networksize.html?graph=networksize&start=2007-07-04&end=2015-12-08

> What then is the defense?

Pray.

Reply via email to