On 2013/07/22 (Jul), at 11:01 AM, Victor Denisov wrote:

> If I'm correct and an attacker will
> need to roughly match the network size for a successful attack, then
> matching a network of 100K nodes, each of which had paid, say, $5 to
> join, would require $500K - heck, even I, being a (relatively) poor
> scientist, would probably be able to raise that money in a couple of
> months (by, i.e., selling off all my property, getting to my eyeballs in
> debt, etc) if I'd be really motivated (i.e., to find a pervert who raped
> my daughter and posted video of that on Freenet, or something). Even if
> nodes would be paying $50 to join (which I don't think is a realistic
> amount), an attacker would still need to come up with just $5M, which
> isn't that much for a middle-sized private company, and is chump change
> for any government agency.
> 
> 2a. Yes, that means that, in my opinion, we can't look to money for
> scarcity, it should be obtained from somewhere else. To find it, I think
> that threat model should be defined better.

I agree.

Another way to think of "scarcity" is by defining the "bottleneck" required for 
a sybil attack.

If we can engineer it such that a legitimate user only needs to "find and mash 
his yubikey once a month", that is near-trivial, but if a sybil network needs 
someone to mash 100k yubikeys per month... you start to get a bottleneck, no? 
What other options are then available but to higher dedicated yubikey mashers 
(now I wonder if that can be done by an auto-loader-type machine), or try and 
compromise yubico corporate?

Beyond more expensive & far-out ideas, that's the best I can come up with ATM.

--
Robert Hailey

Reply via email to